Cloud Computing
Cloud Computing
computing resources, such as servers, storage, and applications, over the internet. Users can access
and use these resources as needed, paying only for what they consume, without the need for
upfront infrastructure investment.
Cloud Provider
Cloud Carrier
Cloud Broker
Cloud Auditor
Cloud Consumer
A group or object that delivers cloud services to cloud consumers or end-users. It offers
various components of cloud computing. Cloud computing consumers purchase a growing
variety of cloud services from cloud service providers.
There are various categories of cloud-based services mentioned below:
IaaS Providers: In this model, the cloud service providers offer infrastructure components
that would exist in an on-premises data center. These components consist of servers,
networking, and storage as well as the virtualization layer.
SaaS Providers: In Software as a Service (SaaS), vendors provide a wide sequence of business
technologies, such as Human resources management (HRM) software, customer relationship
management (CRM) software, all of which the SaaS vendor hosts and provides services
through the internet.
PaaS Providers: In Platform as a Service (PaaS), vendors offer cloud infrastructure and
services that can access to perform many functions. In PaaS, services and products are
mostly utilized in software development. PaaS providers offer more services than IaaS
providers. PaaS providers provide operating system and middleware along with application
stack, to the underlying infrastructure.
2. Cloud Carrier:
The mediator who provides offers connectivity and transport of cloud services within cloud
service providers and cloud consumers. It allows access to the services of the cloud through
Internet networks, telecommunication, and other access devices. Network and telecom
carriers or a transport agent can provide distribution. A consistent level of services is
provided when cloud providers set up Service Level Agreements (SLA) with a cloud carrier. In
general, Carrier may be required to offer dedicated and encrypted connections.
3. Cloud Broker:
An organization or a unit that manages the performance, use, and delivery of cloud services
by enhancing specific capability and offers value-added services to cloud consumers. It
combines and integrates various services into one or more new services. They provide
service arbitrage which allows flexibility and opportunistic choices.
There are major three services offered by a cloud broker:
Service Intermediation.
Service Aggregation.
Service Arbitrage.
Service intermediation is like having a helpful guide in the middle, connecting you to
different services. It makes sure information flows smoothly between different parts.
Service aggregation is like putting together different services in one place, making it
convenient for you. It's like having a menu with all your favourite dishes in one restaurant.
Service arbitrage is like finding the best deal among different services. It's like having a savvy
shopper who compares options to get you the most value for your needs.
4. Cloud Auditor:
There are three major roles of Cloud Auditor which are mentioned below:
Security Audit.
Privacy Impact Audit.
Performance Audit.
- A security audit is like a digital checkup to make sure computer systems are safe. It looks
for and fixes any weaknesses that could be used by unauthorized people.
-A privacy impact audit is like hiring someone to check if personal information is handled
safely and respectfully, ensuring that sensitive data is protected.
-A performance audit is like a review to see how well computer systems are working. It
checks efficiency to make sure everything runs smoothly.
5. Cloud Consumer:
A cloud consumer is an end-user who uses services from Cloud Service Providers (CSPs) by
setting up contracts and paying for measured usage.
A cloud consumer is someone who uses services from companies that offer stuff on the
internet, like storing files or running software. They decide what services they need, make
agreements, and pay for what they use. To make sure things are safe and work well, they
check agreements called SLAs that cover things like quality and security. In a big market, they
can choose the best company with good prices and terms for what they want.
3. **Data Migration:**
- *Challenge:* Moving large amounts of data seamlessly between on-premises systems and
the cloud.
- *Example:* A company transitioning from in-house servers to a cloud-based storage
solution must migrate its existing data without disrupting business operations.
4. **Interoperability:**
- *Challenge:* Ensuring that different cloud services and platforms work well together and
with existing on-premises systems.
- *Example:* Integrating a customer relationship management (CRM) system in the cloud
with an on-premises enterprise resource planning (ERP) system for seamless business
operations.
5. **Cost Management:**
6. **Network Performance:**
8. **Vendor Lock-In:**
1. Open Cluster :
IPs are needed by every node and those are accessed only through the
internet or web. This type of cluster causes enhanced security concerns.
2. Close Cluster :
The nodes are hidden behind the gateway node, and they provide increased
protection. They need fewer IP addresses and are good for computational
tasks.
Cluster Computing Architecture :
• It is designed with an array of interconnected individual computers
and the computer systems operating collectively as a single
standalone system.
• It is a group of workstations or computers working together as a
single, integrated computing resource connected via high speed
interconnects.
• A node – Either a single or a multiprocessor network having
memory, input and output functions and an operating system.
• Two or more nodes are connected on a single line or every node
might be connected individually through a LAN connection.
Cluster Computing Architecture
1. High Performance :
The systems offer better and enhanced performance than that of mainframe
computer networks.
2. Easy to manage :
Cluster Computing is manageable and easy to implement.
3. Scalable :
Resources can be added to the clusters accordingly.
4. Expandability :
Computer clusters can be expanded easily by adding additional computers to
the network. Cluster computing is capable of combining several additional
resources or the networks to the existing computer system.
5. Availability :
The other nodes will be active when one node gets failed and will function
as a proxy for the failed node. This makes sure for enhanced availability.
6. Flexibility :
It can be upgraded to the superior specification or additional nodes can be
added.
Disadvantages of Cluster Computing :
1. High cost :
It is not so much cost-effective due to its high hardware and its design.
2. Problem in finding fault :
It is difficult to find which component has a fault.
3. More space is needed :
Infrastructure may increase as more servers are needed to manage and
monitor.
Applications of Cluster Computing :
• Various complex computational problems can be solved.
• It can be used in the applications of aerodynamics, astrophysics and
in data mining.
• Weather forecasting.
• Image Rendering.
• Various e-commerce applications.
• Earthquake Simulation.
• Petroleum reservoir simulation.
In the P2P network architecture, the computers connect with each other in a
workgroup to share files, and access to internet and printers.
• Each computer in the network has the same set of responsibilities
and capabilities.
• Each device in the network serves as both a client and server.
• The architecture is useful in residential areas, small offices, or
small companies where each computer act as an independent
workstation and stores the data on its hard drive.
• Each computer in the network has the ability to share data with
other computers in the network.
• The architecture is usually composed of workgroups of 12 or more
computers.
How Does P2P Network Work?