Cloud Computing Revision
Cloud Computing Revision
Cloud computing:
Features:
• Pay as you go
• Focus on business rather than IT
• Elasticity
• On Demand Self-Service:
• Broad Network Access
• Resource Pooling: The process of pooling resources by
provider/vendor to serve multiple users at a time
according to their requirement without changing any
configuration of resources.
• Rapid Elasticity
• Measured Service
• Security
Mainframes:
Mainframes are high-performance computers with large
amounts of memory and processors that process billions of
simple calculations and transactions in real time.
SOA:
It defines a way to make software components reusable using
the interfaces.
Formally, SOA is an architectural approach in which
applications make use of services available in the network. In
this architecture, services are provided to form applications,
through a network call over the internet. It uses common
communication standards to speed up and streamline the
service integrations in applications.
Web service:
Web service is a set of open protocols and standards that
allow data to be exchanged between different applications or
systems.
A web service is a software module that is intended to carry
out a specific set of functions. Web services in cloud
computing can be found and invoked over the network.
Virtual appliance
A virtual appliance is a pre-installed and pre-configured
software solution on one or more virtual machines that is
optimized for a specific function.
Autonomic Computing
Autonomic computing is a computer’s ability to manage itself
automatically through adaptive technologies.
Challenges: Risks:
1. Public Cloud:
The whole computing infrastructure is located on the
premises of a CSP that offers the cloud service. This
infrastructure can be accessed by general public.
2. Private Cloud:
Here, the cloud infrastructure is owned by one customer/
organization. This can be on-premise or off-premise as
well.
3. Hybrid cloud:
Means using both private and public clouds, depending
on their purpose.
4. Community cloud:
Community cloud implies an infrastructure that is shared
between organizations, usually with the shared data and
data management concerns.
UNIT 3
Li
• Life cycle of SLA:
1. Contract Definition
2. discovery and negotiation
3. Development & Deployment
4. Execution of services
- Execution and monitoring
- Reporting
- QoS
5. Corrective Actions
6.Termination / Decommission
• Types of SLA:
• Cloud Economics:
1. Tired Pricing
2. Per-unit Pricing
3. Subscription based Pricing
Cloud Resource management :
Objective / Characteristics:
- Scalability
- QoS
- Improved throughput
- Reduce overhead and latency
- Cost effectiveness
- Simple UI
Resources types:
CRM policies:
1. Admission control
2. Load balancing
3. Capacity allocation
4. Energy optimization
5. QoS
UNIT 4
- Making replicas
- Full access over data
- Large volume transaction
- Keeping data ready for all queries
- Stability of DB
- Security
- Scalability and savings
- Governed access
- Automated backups and disaster recovery
- Improved data quality
- Automated updates
- Sustainability
Parallel DBMS:
Instead of a single backend, there are multiple backend
machines connected either to a single host or to multiple
hosts
Three categories:
- Shared memory
- Shared disk
- Shared nothing
Hadoop: Page up
DynamoDB:
It is a service provided by AWS, and is fully managed NoSQL
DB which supports concurrent read and write operations.
Data lake:
- Unstructured, structured, semi – structure data is
stored
- Schema is defined later
- Inexpensive
- Low latency
- Data is kept in raw form
- Used for deep analysis
Data warehouse:
- Structured data
- Schema is defined earlier
- Expensive
- High latency
- Faces issues while transforming data
Big table:
It is NoSQL column-based database which can scale upto
billions of rows and thousand of column and can store
tera bytes or penta bytes of data.
Data can be accessed using:
- Row key
- Column key
- Timestamp key
It uses web API call to access the data in the object storage
using its unique identifier
HADOOP
UNIT 5
Types of attacks –
- Interruption -> restrict access of data/ resources
(availability)
- Interception -> an intermediate (un-intended) entity is
accessing resources (confidentiality)
- Modification -> change in data/ communication ( Data
integrity)
- Fabrication -> changing / altering origin of data (
Authentication )
1. Access control
2. SLA (define the responsibilities of the parties)
3. Certified provider
4. Strict validation for user
5. Event prevention and intervention (inside cloud issues)
6. Third party audit (otp / user backgrd)
7. Encryption algos (rsa, pgp)
8. Intel Data Anonymization (to prevent data
breach/disclosure)
- cost
- support
- licence
- updates / installation
- customization
Disadvantages of cloud computing:
CSPs:
Open stack:
- Open source s/w
- Used for making Private and public cloud
- Large community of developers
- Falls under IaaS
- Virtual h/w
Cloud foundry:
- Open source s/w
- faster and easier
- Testing and deployment
- Falls under PaaS
- Pivotal, from IBM.
Open shift:
- Red hat
- PaaS
Cloudify:
- Acting as a type of middleware, the idea behind
Cloudify was to provide users a simple way to deploy
applications or services in a cloud computing
environment.
- Cloudify is an open source cloud