What Is Cloud Computing
What Is Cloud Computing
Cloud computing enables the users to access systems using a web browser regardless
of their location or what device they use e.g. PC, mobile phone, etc. As infrastructure is
off-site (typically provided by a third-party) and accessed via the Internet, users can
connect from anywhere.
6) Maintenance
Maintenance of cloud computing applications is easier, since they do not need to be
installed on each user's computer and can be accessed from different places. So, it
reduces the cost also.
7) Low Cost
By using cloud computing, the cost will be reduced because to take the services of
cloud computing, IT company need not to set its own infrastructure and pay-as-per
usage of resources.
8) Services in the pay-per-use mode
Application Programming Interfaces (APIs) are provided to the users so that they can
access services on the cloud by using these APIs and pay the charges as per the usage
of services.
Advantages of Cloud Computing
1) Back-up and restore data
Once the data is stored in the cloud, it is easier to get back-up and restore that data
using the cloud.
2) Improved collaboration
Cloud applications improve collaboration by allowing groups of people to quickly and
easily share information in the cloud via shared storage.
3) Excellent accessibility
Cloud allows us to quickly and easily access store information anywhere, anytime in the
whole world, using an internet connection. An internet cloud infrastructure increases
organization productivity and efficiency by ensuring that our data is always accessible.
4) Low maintenance cost
Cloud computing reduces both hardware and software maintenance costs for
organizations.
5) Mobility
Cloud computing allows us to easily access all cloud data via mobile.
6) IServices in the pay-per-use model
Cloud computing offers Application Programming Interfaces (APIs) to the users for
access services on the cloud and pays the charges as per the usage of service.
7) Unlimited storage capacity
Cloud offers us a huge amount of storing capacity for storing our important data such
as documents, images, audio, video, etc. in one place.
8) Data security
Data security is one of the biggest advantages of cloud computing. Cloud offers many
advanced features related to security and ensures that data is securely stored and
handled.
Disadvantages of Cloud Computing
A list of the disadvantage of cloud computing is given below -
3
1) Internet Connectivity
As you know, in cloud computing, every data (image, audio, video, etc.) is stored on the
cloud, and we access these data through the cloud by using the internet connection. If
you do not have good internet connectivity, you cannot access these data. However, we
have no any other way to access data from the cloud.
2) Vendor lock-in
Vendor lock-in is the biggest disadvantage of cloud computing. Organizations may face
problems when transferring their services from one vendor to another. As different
vendors provide different platforms, that can cause difficulty moving from one cloud to
another.
3) Limited Control
As we know, cloud infrastructure is completely owned, managed, and monitored by the
service provider, so the cloud users have less control over the function and execution of
services within a cloud infrastructure.
4) Security
Although cloud service providers implement the best security standards to store
important information. But, before adopting cloud technology, you should be aware that
you will be sending all your organization's sensitive information to a third party, i.e., a
cloud computing service provider. While sending the data on the cloud, there may be a
chance that your organization's information is hacked by Hackers.
Cloud Computing Architecture
As we know, cloud computing technology is used by both small and large organizations
to store the information in cloud and access it from anywhere at anytime using the
internet connection.
Cloud computing architecture is a combination of service-oriented architecture and
event-driven architecture.
Cloud computing architecture is divided into the following two parts -
● Front End
● Back End
The below diagram shows the architecture of cloud computing -
4
Front End
The front end is used by the client. It contains client-side interfaces and applications
that are required to access the cloud computing platforms. The front end includes web
servers (including Chrome, Firefox, internet explorer, etc.), thin & fat clients, tablets, and
mobile devices.
Back End
The back end is used by the service provider. It manages all the resources that are
required to provide cloud computing services. It includes a huge amount of data
storage, security mechanism, virtual machines, deploying models, servers, traffic control
mechanisms, etc.
Components of Cloud Computing Architecture
There are the following components of cloud computing architecture -
1. Client Infrastructure
Client Infrastructure is a Front end component. It provides GUI (Graphical User
Interface) to interact with the cloud.
2. Application
The application may be any software or platform that a client wants to access.
3. Service
A Cloud Services manages that which type of service you access according to the
client’s requirement.
Cloud computing offers the following three type of services:
i. Software as a Service (SaaS) – It is also known as cloud application services. Mostly,
SaaS applications run directly through the web browser means we do not require to
download and install these applications. Some important example of SaaS is given
below –
Example: Google Apps, Salesforce Dropbox, Slack, Hubspot, Cisco WebEx.
ii. Platform as a Service (PaaS) – It is also known as cloud platform services. It is quite
similar to SaaS, but the difference is that PaaS provides a platform for software
creation, but using SaaS, we can access software over the internet without the need of
any platform.
Example: Windows Azure, Force.com, Magento Commerce Cloud, OpenShift.
iii. Infrastructure as a Service (IaaS) – It is also known as cloud infrastructure services.
It is responsible for managing applications data, middleware, and runtime
environments.
Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE), Cisco
Metapod.
4. Runtime Cloud
Runtime Cloud provides the execution and runtime environment to the virtual
machines.
5. Storage
Storage is one of the most important components of cloud computing. It provides a
huge amount of storage capacity in the cloud to store and manage data.
6. Infrastructure
5
It provides services on the host level, application level, and network level. Cloud
infrastructure includes hardware and software components such as servers, storage,
network devices, virtualization software, and other storage resources that are needed to
support the cloud computing model.
7. Management
Management is used to manage components such as application, service, runtime
cloud, storage, infrastructure, and other security issues in the backend and establish
coordination between them.
8. Security
Security is an in-built back end component of cloud computing. It implements a security
mechanism in the back end.
9. Internet
The Internet is medium through which front end and back end can interact and
communicate with each other.
Cloud Computing is more flexible than Grid Computing is less flexible than cloud
grid computing. computing.
In cloud computing, cloud servers are In Grid computing, grids are owned and
owned by infrastructure providers. managed by the organization.
Cloud computing uses services like Grid computing uses systems like
Iaas, PaaS, and SaaS. distributed computing, distributed
information, and distributed pervasive.
cloud storage system. On Facebook, we will always get notifications when our friends
like and comment on the posts.
ii. Twitter
Twitter is a social networking site. It is a microblogging system. It allows users to
follow high profile celebrities, friends, relatives, and receive news. It sends and receives
short posts called tweets.
iii. Yammer
Yammer is the best team collaboration tool that allows a team of employees to chat,
share images, documents, and videos.
iv. LinkedIn
LinkedIn is a social network for students, freshers, and professionals.
Types of Cloud
There are the following 4 types of cloud that you can deploy according to the
organization's needs-
Public Cloud
Public cloud is open to all to store and access information via the Internet using the
pay-per-usage method.
In public cloud, computing resources are managed and operated by the Cloud Service
Provider (CSP).
Example: Amazon elastic compute cloud (EC2), IBM SmartCloud Enterprise, Microsoft,
Google App Engine, Windows Azure Services Platform.
● Private cloud is not suitable for organizations that have a high user base, and
organizations that do not have the prebuilt infrastructure, sufficient manpower to
maintain and manage the cloud.
Hybrid Cloud
Hybrid Cloud is a combination of the public cloud and the private cloud. we can say:
Hybrid Cloud = Public Cloud + Private Cloud
Hybrid cloud is partially secure because the services which are running on the public
cloud can be accessed by anyone, while the services which are running on a private
cloud can be accessed only by the organization's users.
Example: Google Application Suite (Gmail, Google Apps, and Google Drive), Office 365
(MS Office on the Web and One Drive), Amazon Web Services.
Community Cloud
Community cloud allows systems and services to be accessible by a group of several
organizations to share the information between the organization and a specific
community. It is owned, managed, and operated by one or more organizations in the
community, a third party, or a combination of them.
Example: Health Care community cloud
this problem, distributed computing led to three more types of computing and they
were-Mainframe computing, cluster computing, and grid computing.
Mainframe computing:
Mainframes which first came into existence in 1951 are highly powerful and reliable
computing machines. These are responsible for handling large data such as massive
input-output operations. Even today these are used for bulk processing tasks such as
online transactions etc.
Cluster computing:
In 1980s, cluster computing came as an alternative to mainframe computing. Each
machine in the cluster was connected to each other by a network with high bandwidth.
These were way cheaper than those mainframe systems. These were equally capable
of high computations.Also, new nodes could easily be added to the cluster if it was
required. Thus, the problem of the cost was solved to some extent but the problem
related to geographical restrictions still pertained. To solve this, the concept of grid
computing was introduced.
Grid computing:
In 1990s, the concept of grid computing was introduced. It means that different systems
were placed at entirely different geographical locations and these all were connected via
the internet. These systems belonged to different organizations and thus the grid
consisted of heterogeneous nodes. Although it solved some problems but new
problems emerged as the distance between the nodes increased. The main problem
which was encountered was the low availability of high bandwidth connectivity and with
it other network associated issues. Thus. cloud computing is often referred to as
“Successor of grid computing”.
Virtualization:
It was introduced nearly 40 years back. It refers to the process of creating a virtual layer
over the hardware which allows the user to run multiple instances simultaneously on the
hardware. It is a key technology used in cloud computing. It is the base on which major
cloud computing services such as Amazon EC2, VMware vCloud, etc work on.
Hardware virtualization is still one of the most common types of virtualization.
Web 2.0:
It is the interface through which the cloud computing services interact with the clients. It
is because of Web 2.0 that we have interactive and dynamic web pages. It also
increases flexibility among web pages. Popular examples of web 2.0 include Google
Maps, Facebook, Twitter, etc. Needless to say, social media is possible because of this
technology only. In gained major popularity in 2004.
Service orientation:
It acts as a reference model for cloud computing. It supports low-cost, flexible, and
evolvable applications. Two important concepts were introduced in this computing
16
model. These were Quality of Service (QoS) which also includes the SLA (Service Level
Agreement) and Software as a Service (SaaS).
Utility computing:
It is a computing model that defines service provisioning techniques for services such
as compute services along with other major services such as storage, infrastructure, etc
which are provisioned on a pay-per-use basis.
Monitoring as a service(maas):-
Monitoring as a Service (MaaS) is a security service that provides security to IT
assets of any business 24/7. It plays a vital role in securing an enterprise or
government clients from any possible cyber threats. MaaS is a monitoring service
that can be outsourced in a flexible and consumption-based subscription model.
5. Mitigate Threats!
When encrypting data, you must take special precautions to prevent data loss and keep
high data integrity levels. Make sure that your systems have robust and intelligent threat
mitigation mechanisms that can decide what to do with a suspicious file.
This could include:
● Blocking access
● Quarantining the file
● Purging the file
● Restoring the file
A good threat mitigation system should be able to do this without compromising genuine
network traffic that is essential to your operations.
6. Redundancy!
If your data is lost or stolen, you will need a disaster recovery plan. Your cloud
management system can manage data redundancy within the cloud. It’s much better
having a plan to recover data than to negotiate with a party that stole your data. Your
operations will not suffer too much because you can quickly recover.
7. Legal Compliance!
Many large enterprises need to comply with data storage regulations. There are so
many rules and regulations in terms of cloud computing implementation and security.
Once you find out your industry and location-specific legal requirements, you will find
that managed cloud security has a solution for you. An example of this could involve
retaining consumer information for a while or deleting it within a set period.
8. Cloud security reporting!
Companies sometimes overlook cloud security reporting because they assume that
security is the cloud service provider’s domain. You need to closely monitor the
diagnostics from cloud software and report any suspicious events to your security
teams.
Build up a bank of information so that you fully understand what your security exposure
is. If one area of your network reports repeated irregularities, it’s worth looking into it.
Evolution of MSP:- The evolution of MSPs began in the 1990s with the
emergence of application service providers (ASPs), which offered a level of
service for remote application hosting. ASPs helped pave the way for cloud
computing and companies that would provide remote support for customers'
IT infrastructure. MSPs initially focused on the remote monitoring and
management (RMM) of servers and networks.
What is a managed service provider ?
A managed service provider (MSP) is a third-party company that remotely
manages a customer's information technology (IT) infrastructure and end-user
systems. Small and medium-sized businesses (SMBs), nonprofits and
government agencies hire MSPs to perform a defined set of day-to-day
management services. These services may include network and infrastructure
management, security and monitoring.
types of MSPs?
● Pure-play MSPs. These tend to be smaller providers that focus on
monitoring networks and application performance. They offer their own native
services that focus mainly on reporting and alerts.
● Staffing legacy MSPs. These MSPs generally target midlevel organizations
and Fortune 500 companies and often offer a wide range of services,
including monitoring, reporting, and software installation and upgrades.
● High-level MSPs. These consist of small and large providers that enable
their clients to outsource as much of their IT processes as needed. Typically,
high-level MSPs offer a wide range of services.
●
MSPs can also be categorized by the type of services they offer:
● Monitoring. These MSPs offer real-time monitoring software for different
applications, network devices, servers or websites.
● Remote support. These MSPs offer cloud-based software, support remote
devices and remotely troubleshoot technical issues.
● Proactive support. These MSPs perform preventative maintenance to stay
ahead of any device or network issues that could arise.
● Centralized management. These MSPs provide a management console for
complex networks, remote monitoring, patch management and security
software.
23
4.Storage Virtualization.
5.Server Virtualization.
6.Data virtualization.
1. Application Virtualization:
Application virtualization helps a user to have remote access of an application from a
server. The server stores all personal information and other characteristics of the
application but can still run on a local workstation through the internet. Example of this
would be a user who needs to run two different versions of the same software.
Technologies that use application virtualization are hosted applications and packaged
applications.
2. Network Virtualization:
The ability to run multiple virtual networks with each has a separate control and data
plan. It co-exists together on top of one physical network. It can be managed by
individual parties that potentially confidential to each other.
Network virtualization provides a facility to create and provision virtual networks—logical
switches, routers, firewalls, load balancer, Virtual Private Network (VPN), and workload
security within days or even in weeks.
3. Desktop Virtualization:
Desktop virtualization allows the users’ OS to be remotely stored on a server in the data
centre. It allows the user to access their desktop virtually, from any location by a
different machine. Users who want specific operating systems other than Windows
Server will need to have a virtual desktop. Main benefits of desktop virtualization are
user mobility, portability, easy management of software installation, updates, and
patches.
4. Storage Virtualization:
Storage virtualization is an array of servers that are managed by a virtual storage
system. The servers aren’t aware of exactly where their data is stored, and instead
function more like worker bees in a hive. It makes managing storage from multiple
sources to be managed and utilized as a single repository. storage virtualization
software maintains smooth operations, consistent performance and a continuous suite
of advanced functions despite changes, break down and differences in the underlying
equipment.
5. Server Virtualization:
This is a kind of virtualization in which masking of server resources takes place. Here,
the central-server(physical server) is divided into multiple different virtual servers by
25
changing the identity number, processors. So, each system can operate its own
operating systems in isolate manner. Where each sub-server knows the identity of the
central server. It causes an increase in the performance and reduces the operating cost
by the deployment of main server resources into a sub-server resource. It’s beneficial in
virtual migration, reduce energy consumption, reduce infrastructural cost, etc.
6. Data virtualization:
This is the kind of virtualization in which the data is collected from various sources and
managed that at a single place without knowing more about the technical information
like how data is collected, stored & formatted then arranged that data logically so that its
virtual view can be accessed by its interested people and stakeholders, and users
through the various cloud services remotely. Many big giant companies are providing
their services like Oracle, IBM, At scale, Cdata, etc.
Emulation Virtualization
In Emulation, the virtual machine simulates the hardware and hence becomes
independent of it. In this, the guest operating system does not require modification.
Paravirtualization
In Paravirtualization, the hardware is not simulated. The guest software run their own
isolated domains.