0% found this document useful (0 votes)
16 views

CC Unit2

Uploaded by

VivuEtukuru
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

CC Unit2

Uploaded by

VivuEtukuru
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

UNIT II - UNDERSTANDING CLOUD MODELS AND ARCHITECTURES

Cloud Models: NIST model


Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to
a shared pool of configurable computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction. This cloud model is composed of five
essential characteristics, three service models, and four deployment models.

Essential Characteristics:
On-demand self-service. A consumer can unilaterally provision computing capabilities, such as
server time and network storage, as needed automatically without requiring human interaction
with each service provider.
Broad network access. Capabilities are available over the network and accessed through
standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g.,
mobile phones, tablets, laptops, and workstations).
Resource pooling. The provider’s computing resources are pooled to serve multiple consumers
using a multi-tenant model, with different physical and virtual resources dynamically assigned
and reassigned according to consumer demand. (e.g., country, state, or datacenter). Examples
of resources include storage, processing, memory, and network bandwidth.
Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases
automatically, to scale rapidly outward and inward commensurate with demand. To the
consumer, the capabilities available for provisioning often appear to be unlimited and can be
appropriated in any quantity at any time.
Measured service. Cloud systems automatically control and optimize resource use by
leveraging a metering capability1 at some level of abstraction appropriate to the type of service
(e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be
monitored, controlled, and reported,
Cloud Cube model
The four dimensions of the Cloud Cube Model are shown in Figure 1.2 and listed here:

Physical location of the data: Internal (I) / External (E) determines your organization’s
boundaries.
Ownership: Proprietary (P) / Open (O) is a measure of not only the technology ownership, but
of interoperability, ease of data transfer, and degree of vendor application lock-in.

Security boundary: Perimeterised (Per) / De-perimiterised (D-p) is a measure of whether the


operation is inside or outside the security boundary or network firewall.

Sourcing: Insourced or Outsourced means whether the service is provided by the cus- tomer or
the service provider

Deployment models: Public, Private, Hybrid and Community


Cloud Deployment Model functions as a virtual computing environment with a deployment
architecture that varies depending on the amount of data you want to store and who has
access to the infrastructure.
Public cloud. The cloud infrastructure is provisioned for open use by the general public. It may
be owned, managed, and operated by a business, academic, or government organization, or
some combination of them. It exists on the premises of the cloud provider.
Private cloud. The cloud infrastructure is provisioned for exclusive use by a single organization
comprising multiple consumers (e.g., business units). It may be owned, managed, and operated
by the organization, a third party, or some combination of them, and it may exist on or off
premises.
Community cloud. The cloud infrastructure is provisioned for exclusive use by a specific
community of consumers from organizations that have shared concerns (e.g., mission, security
requirements, policy, and compliance considerations). It may be owned, managed, and
operated by one or more of the organizations in the community, a third party, or some
combination of them, and it may exist on or off premises.
Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud
infrastructures (private, community, or public) that remain unique entities, but are bound
together by standardized or proprietary technology that enables data and application
portability (e.g., cloud bursting for load balancing between clouds)

1.Public Cloud 2. Private cloud

3. Community cloud
4. Hybrid cloud

Service models: laas, Paas and Saas

Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s
applications running on a cloud infrastructure . The applications are accessible from various
client devices through either a thin client interface, such as a web browser (e.g., web-based
email), or a program interface. The consumer does not manage or control the underlying cloud
infrastructure including network, servers, operating systems, storage, or even individual
application capabilities, with the possible exception of limited userspecific application
configuration settings
Example: BigCommerce, Google Apps, Salesforce, Dropbox, ZenDesk, Cisco WebEx, ZenDesk,
Slack, and GoToMeeting.
Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the
cloud infrastructure consumer-created or acquired applications created using programming
languages, libraries, services, and tools supported by the provider.3 The consumer does not
manage or control the underlying cloud infrastructure including network, servers, operating
systems, or storage, but has control over the deployed applications and possibly configuration
settings for the application-hosting environment.
Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine,
Apache Stratos, Magento Commerce Cloud, and OpenShift.
Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision
processing, storage, networks, and other fundamental computing resources where the
consumer is able to deploy and run arbitrary software, which can include operating systems
and applications. The consumer does not manage or control the underlying cloud infrastructure
but has control over operating systems, storage, and deployed applications; and possibly
limited control of select networking components (e.g., host firewalls).
Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure, Google Compute
Engine (GCE), Rackspace, and Cisco Metacloud.

Understanding Cloud Architecture:


Cloud computing builds on the architecture developed for staging large distributed network
applications on the Internet. Cloud architecture can couple software running on virtualized
hardware in multiple locations to provide an on- demand service to user-facing hardware and
software
Many descriptions of cloud computing describe it in terms of two architectural layers:
1. A client as a front end
2. The “cloud” as a backend
Cloud computing architecture is a combination of service-oriented architecture and event-
driven architecture.

Components of Cloud Computing Architecture: Client Infrastructure: Client Infrastructure is a


Front end component. It provides GUI (Graphical User Interface) to interact with the cloud.

 Application: The application may be any software or platform that a client wants to
access.
 Service: A Cloud Services manages that which type of service you access according to
the client’s requirement.
 Runtime Cloud: Runtime Cloud provides the execution and runtime environment to the
virtual machines.
 Storage: Storage is one of the most important components of cloud computing. It
provides a huge amount of storage capacity in the cloud to store and manage data.
 Infrastructure:It provides services on the host level, application level, and network level.
Cloud infrastructure includes hardware and software components such as servers,
storage, network devices, virtualization software, and other storage resources that are
needed to support the cloud computing model.
 Management: Management is used to manage components such as application, service,
runtime cloud, storage, infrastructure, and other security issues in the backend and
establish coordination between them.
 Security: Security is an in-built back end component of cloud computing. It implements
a security mechanism in the back end.

Cloud computing offers the following three type of services:


i. Software as a Service (SaaS)
ii. Platform as a Service (PaaS)
iii. Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)
 In the IaaS service all the required infrastructure solutions are designed & deployed
in meet to requirement for any software solution.
Ex:- Design an infrastructure for website portal with proper DB & Security
 A PaaS or SaaS service provider gets the same benefits from a com- posable system that
a user does—these things, among others:
 Easier to assemble systems
 Cheaper system development
 More reliable operation
 A larger pool of qualified developers
 A logical design methodology

Exploring the Cloud Computing Stack: Composability, Infrastructure, Platforms, Virtual


Appliances, Communication Protocols, Applications;

Composability:
A composable system uses components to assemble services that can be tailored for a specific
purpose using standard parts. A composable component must be:
 Modular: It is a self-contained and independent unit that is cooperative, reusable, and
replaceable.
 Stateless: A transaction is executed without regard to other transactions or requests

Infrastructure
Infrastructure as a Service (IaaS) providers rely on virtual machine technology to deliver servers
that can run applications. VM instance have characteristics that often can be described in terms
of real servers delivering a certain number of microprocessor (CPU) cycles, memory access, and
network bandwidth to customers

The software that runs in the virtual machines is what defines the utility of the cloud computing
system.

Cloud computing stack that is designated as the server.


Here apart from APIs everything is encapsulated in to VM Server but the actual use of API relay
on Programmer & project runtime.

Platforms: Platform as a Service (PaaS) providers offer services meant to provide developers
with different capabilities
 l Salesforce.com’s Force.com Platform
 l Windows Azure Platform
 l Google Apps and the Google AppEngine
These three services offer all the hosted hardware and software needed to build and deploy
Web applications or services that are custom built by the developer

A platform in the cloud is a software layer that is used to create higher levels of service, These
three services offer all the hosted hardware and software needed to build and deploy Web
applications or services that are custom built by the developer

Platforms often come replete with tools and utilities to aid in application design and
deployment. & most often we find developer tools for team collaboration, testing tools,
instrumentation for measuring program performance and attributes, versioning, database and
Web service integration, and storage tools.

Virtual Appliance Applications such as a Web server or database server that can run on a virtual
machine image are referred to as virtual appliances

Virtual Appliances may expose itself to users through an API, so too an application built in the
cloud using a platform service would encapsulate the service through its own API. Many
platforms offer user interface development tools based on HTML, JavaScript, or some other
technology. Web becomes more media-oriented, many developers have chosen to work with
rich Internet environments such as Adobe Flash, Flex, or Air, or alternatives such as Windows
Silverlight

A virtual appliance is software that installs as middleware onto a virtual machine.


VMware’s Virtual Appliance marketplace:

 VirtualBox: is a virtual machine technology now owned by Oracle that can run various
operating systems and serves as a host for a variety of virtual appliances.
 Vmachines : is a site with desktop, server, and security- related operating systems that
run on VMware.

Communication Protocols:- Cloud uses services available over the Internet communicating
using the stan- dard Internet protocol suite underpinned by the HTTP and HTTPS transfer
protocols

In use of Inter Process communication(IPC) enables many client/server protocols have been
applied to distributed networking over the years. Various forms of RPC (Remote Procedure Call)
implementations (including DCOM, Java RMI, and CORBA) attempt to solve the problem of
engaging services

Protocols used often in Communicating in connecting Virtual Machines

1. RDP – 3389 –login to windows VM


2. SSH -22 – Login to Linux VM
3. HTTP – Allow Web Traffic
4. HTTPS – allow Web Traffic in secure mode

Applications:- In Nature all Websites or any Distributed apis are written in Web Tech & this be
the application which designed to work in web . Variety of web apps may be different but
common idea was to host application in public via Internet using web.

CONNECTING TO THE CLOUD:


Clients can connect to a cloud service in a number of different ways. These are the two most
common means:
1. A Web browser
2. A proprietary application
Cloud application can be running on a server, a PC, a mobile device, or a cell phone. these application
types is that they are exchanging data over an inherently insecure and transient medium.
There are three basic methods for securely connecting over a connection:

 Use a secure protocol to transfer data such as SSL (HTTPS), FTPS, or IPsec, or connect
using a secure shell such as SSH to connect a client to the cloud.
 Create a virtual connection using a virtual private network (VPN), or with a remote data
transfer protocol such as Microsoft RDP or Citrix ICA, where the data is protected by a
tunneling mechanism.
 Encrypt the data so that even if the data is intercepted or sniffed, the data will not be
meaningful.
THE JOLICLOUD NETBOOK OS
Joli OS, developed by Jolicloud, provides file sharing and access to Web applications (apps) and
desktops from the cloud. Based on the Ubuntu Linux kernel, Joli OS was designed to give
netbook and low-end processors the ability to utilize Web app and basic computing services
without hardware upgrades.

 Joli OS is installed as a thin client on a host desktop and provisions a variety of Web apps
from the cloud, including standard Web browsers, Gmail, Dropbox, Google Docs and
Flickr.
 Joli OS hosts a number of apps that may be accessed and easily added to the cloud
desktop via the default launcher. Joli OS also provides social bookmarking capabilities
for user sharing of popular apps and services.

Jolicloud concentrates on building a social platform with automatic software updates and
installs. The application launcher is built in HTML 5 and comes preinstalled with Gmail, Skype,
Twitter,Firefox, and other applications.

Any HTML 5 browser can be used to work with the Jolicloud interface. Jolicloud maintains a
library or App Directory of over 700 applications as part of an app store. When you click to
select an application, the company both installs and updates the applica- tion going forward,
just as the iPhone manages applications on that device.

The Jolicloud interface.


CHROMIUM OS - THE BROWSER AS AN OPERATING SYSTEM.
Chrome OS is an operating system developed by Google. It is designed primarily for use with
web applications and cloud computing, and it is based on the open-source Chromium OS
project. Chrome OS is known for its simplicity, speed, and security. Here are some key features
and benefits of Chrome OS:
1. Web-Centric: Chrome OS is centered around the web, and most of its applications and
services are cloud-based. This means that you can access your files, documents, and
applications from any device with an internet connection, making it highly convenient
and portable.
2. Fast Boot Times: Chrome OS is optimized for quick boot times. It allows you to start up
your Chromebook or Chrome OS device in a matter of seconds, making it ideal for users
who need instant access to their information.
3. Automatic Updates: Chrome OS automatically updates itself in the background,
ensuring that you are always using the latest version with the latest security patches
and features. This helps keep your device secure and up-to-date without requiring any
manual intervention.
4. Security: Chrome OS is designed with security in mind. Each application runs in its own
sandbox, isolating it from other parts of the system, reducing the risk of malware and
other security threats. Additionally, features like Verified Boot and automatic updates
help protect against potential vulnerabilities.
5. User-Friendly Interface: Chrome OS has a simple and intuitive interface that is easy to
navigate, making it accessible for both experienced and novice users.
6. Lightweight and Efficient: Chrome OS is lightweight, which means it can run smoothly
on low-powered hardware, making it ideal for budget-friendly devices like
Chromebooks.
7. Google Ecosystem Integration: Chrome OS integrates seamlessly with Google's
ecosystem, including Google Drive, Gmail, Google Docs, and other Google services. This
integration allows for easy synchronization and access to your data across different
devices.
8. Offline Capabilities: While Chrome OS is heavily focused on cloud-based applications,
many apps have offline capabilities, allowing you to work or entertain yourself even
when you're not connected to the internet.
9. Affordability: Chromebooks, which are laptops running Chrome OS, are often more
affordable than traditional laptops, making them an attractive option for budget-
conscious users.
10. Guest Mode: Chrome OS includes a guest mode feature, allowing others to use your
Chromebook without accessing your personal data.
It's worth noting that while Chrome OS is well-suited for users who primarily work and live in
the browser and use web applications, it may not be suitable for everyone, especially those
who require specialized software or heavy offline capabilities. However, it has gained popularity
in education, business, and casual use cases due to its simplicity, security, and ease of use.

You might also like