Open Course Report - Cloud Computing
Open Course Report - Cloud Computing
ARYAN AGRAWAL
1BY20CS030
1 Introduction 4
2 Concepts 5
2.1 Cyber infrastructure 2.2 Service-Oriented Architecture
3 Cloud Architecture 7
3.1 Cloud Types
4 Component 9
4.1 Virtualization 4.2 Users
5 Working 10
7 Conclusion
12
8 References 13
Cloud computing is the next natural step in the evolution of on-demand information technology
services and products. To a large extent cloud computing will be based on virtualized resources.
The idea of cloud computing is based on a very fundamental principal of `reusability of IT
capabilities`. The difference that cloud computing brings compared to traditional concepts of
―grid computingǁ, ―distributed computingǁ, ―utility computingǁ, or ―autonomic computingǁ is
to broaden horizons across organizational boundaries.
According to the IEEE Computer Society Cloud Computing is:
Though many cloud computing architectures and deployments are powered by grids, based on
autonomic characteristics and consumed on the basis of utilities billing, the concept of a cloud is
fairly distinct and complementary to the concepts of grid, SaaS, Utility Computing etc. In theory,
cloud computing promises availability of all required hardware, software, platform, applications,
infrastructure and storage with an ownership of just an internet connection.
people can access the information that they need from any device with an Internet connection—
including mobile and handheld phones—rather than being chained to the desktop. It also means
lower costs, since there is no need to install software or hardware.ǁ
Cloud computing used to posting and sharing photos on orkut, instant messaging with friends
maintaining and upgrading business technology
Today, almost any business or major activity uses, or relies in some form, on IT and IT services.
These services need to be enabling and appliance-like, and there must be an economy of- scale for
the total-cost-of-ownership to be better than it would be without cyber infrastructure. Technology
needs to improve end-user productivity and reduce Technology-driven overhead
This closely resembles the Unix philosophy of having multiple programs doing one thing well
and working together over universal interfaces. Complexity is controlled and the resulting systems
are more manageable than their monolithic counterparts.
Cloud architecture extends to the client, where web browsers and/or software applications access
cloud applications. Cloud storage architecture is loosely coupled, where metadata operations are
centralized enabling the data nodes to scale into the hundreds, each independently delivering data
to applications or users
Public cloud:
Public cloud or external cloud describes cloud computing in the traditional mainstream. Public
clouds are run by third parties, and applications from different customers are likely to be mixed
together on the cloud’s servers, storage systems, and networks. A public cloud provides services
to multiple customers.
Private cloud:
Private clouds are built for the exclusive use of one client, providing the utmost control over
data, security, and quality of service (Figure 4). The company owns the infrastructure and
has control over how applications are deployed on it. Private clouds can be built and
managed by a company’s own IT organization or by a cloud provider
.
Cloud computing products and services can be classified into 4 major categories:
They are
1. Application as service ( AaaS)
2. Platform as a Service (PaaS)
3. Infrastructure as a service (IaaS)
4. Software as a Service (SaaS)
1. Application as s service (AaaS): These are the first kind of cloud computing services that
came into being. Under this, a service is made available to an end-user. The end-user is asked to
create an account with the service provider and start using the application. One of first famous
application was web-based email service by hotmail started in 1996. Scores of such services are
available now on the web.
2. Platform as a Service (PaaS): Cloud vendors are companies that offer cloud computing
services and products. One of the services that they provide is called PaaS. Under this a
computing platform such as operating system is provided to a customer or end user on a monthly
rental basis. Some of the major cloud computing vendor are Amazon, Microsoft, Google etc
The key to a SOA framework that supports workflows is componentization of its services, an
ability to support a range of couplings among workflow building blocks, fault-tolerance in its data-
and process-aware service-based delivery, and an ability to audit processes, data and results, i.e.,
collect and use provenance information. Component-based approach is characterized by
reusability (elements can be re-used in other workflows), substitutability (alternative
implementations are easy to insert, very precisely specified interfaces are available, run-time
component replacement mechanisms exist, there is ability to verify and validate substitutions, etc),
extensibility and scalability (ability to readily extend system component pool and to scale it,
increase capabilities of individual components, have an extensible and scalable architecture that
can automatically discover new functionalities and resources, etc),customizability (ability to
customize generic features to the needs of a particular scientific domain and problem), and
composability (easy construction of more complex functional solutions using basic components,
reasoning about such compositions, etc.). There are other characteristics that also are very
important. Those include reliability and availability of the components and services, the cost of
the services, security, total cost of ownership, economy of scale, and so on.In the context of cloud
computing we distinguish many categories of components. From differentiated and
undifferentiated hardware, to general-purpose and specialized software and applications, to real
and virtual ―imagesǁ, to environments, to no-root Differentiated resources, to workflow-based
environments and collections of services, and soon.
4.1 Virtualization
Virtualization is another very useful concept. It allows abstraction and isolation of lower-level
functionalities and underlying hardware. This enables portability of higher-level functions and
sharing and/or aggregation of the physical resources. The virtualization concept has been around
in some form since 1960s (e.g., in IBM mainframe systems). Since then, the concept has matured
considerably and it has been applied to all aspects of computing – memory, storage, processors,
software, networks, as well as services that IT offers. It is the combination of the growing needs
and the recent advances in the IT architectures and solutions that is now bringing the virtualization
to the true commodity level. Virtualization, through its economy of scale, and its ability to offer
very advanced and complex IT services at a reasonable cost, is poised to become, along with
wireless and highly distributed and pervasive computing devices, such as sensors and personal
cell-based access devices, the driving technology behind the next waive in IT growth .Not
surprisingly there are dozens of virtualization products, and a number of small and large companies
that make them. Some examples in the operating systems and software applications space are
VMware1, Xen - an open source Linux-based product developed by XenSource2, and Microsoft
virtualization products, to mention a few. Major IT players have also shown a renewed interest in
the
technology. Classical storage players such as EMC10, NetApp11, IBM12 and Hitachi13 have not
been standing still either. In addition, the network virtualization market is teeming with activity.
The most important Cloud entity, and the principal quality driver and constraining influence is,
of course, the user. The value of a solutions depends very much on the view it has of its enduser
requirements and user categories.
There four broad sets of nonexclusive user categories:
System or Cyber infrastructure (CI) developers, developers (authors) of different component
services and underlying applications, technology and domain personnel that integrates basic
services into composite services and their orchestrations (workflows) and delivers those to
endusers, and finally users of simple and composite services. User categories also include domain
specific groups, and indirect users such as stakeholders, policy makers, and so on. Functional and
usability requirements derive, in most part, directly from the user profiles.
Demerits:
Stored data might not be secure: With cloud computing, all our data is stored on the cloud. The
unauthorized users gain access to our confidential data.
Dependent on internet connection:Internet connectivity isn’t completely stable and reliable.
It’s not platform agnostic:Most clouds force participants to rely on a single platform or host only
one type of product.
Can be slow:Even on a fast connection,web based application scan sometimes be slower than
accessing a similar software program on our desktop PC
Magazines:
Websites:
www.ibm.com/developerworks/websphere/zones/hipods/library.html\
http://communication.howstuffworks.com/cloud-computing2.html
www.thbs.com
http://www.wikipedia.org/