Unit-1,2 Notes
Unit-1,2 Notes
2. Backend:
• Manages resources, security, and storage.
• Includes virtual applications, machines, traffic control, and deployment models.
• Application: Backend software/platform accessed by the client.
• Service: Manages cloud services (SaaS, PaaS, IaaS).
• Runtime Cloud: Provides execution environment for VMs.
• Storage: Scalable storage and data management.
• Infrastructure: Includes servers, storage, and network devices.
• Security: Implements mechanisms to protect cloud resources.
• Internet: Bridge between frontend and backend.
• Database: Manages data storage (SQL, NoSQL).
• Networking: Supports load balancing, DNS, VPNs.
• Analytics: Provides data analytics capabilities in the cloud.
Advantages of Cloud Computing Disadvantages of Cloud Computing
Cloud Provider
▪ Five major activities of Cloud Provider’s
• Service deployment
• Service orchestration
• Cloud service management
• Security
• Privacy
Service Models
• Service Models are the reference models on which the Cloud Computing is based.
• These can be categorized into three basic service models as listed below:
(1)SAAS
(2)PAAS
(3)IAAS
SAAS
● SAAS stands for Software as a service.
● SAAS delivers software applications over the internet on a subscription basis.
● SAAS model allows to use software applications as a service to end users.
● Users can access these applications through a web browser, without needing to install or
maintain the software on their devices.
• Usually billed based on usage
• Usually multi tenant environment
• Highly scalable architecture
How It Works: The cloud service provider manages everything from the hardware and
software to data storage and security. Users simply log in and use the software through a web
interface.
SAAS EXAMPLES:-
◘ Google Workspace ◘ FaceBook
◘ SalesForce ◘ Microsoft Office 365
◘ NETSUITE
PAAS
● PAAS stands for Platform as a service
● PAAS provides the runtime environment for applications, development & deployment
tools, etc.
● It includes tools and services for development, testing, deployment, and maintenance.
● Typically applications must be developed with a particular platform in mind
○ Multi tenant environments
○ Highly scalable multi tier architecture
How It Works:
● PaaS offers a comprehensive environment for software development that includes
programming languages, libraries, services, and tools supported by the cloud provider.
● Developers can focus on writing code and creating applications, while the provider
manages servers, storage, and networking.
PAAS EXAMPLES:-
◘ Amazon
◘ SalesForce
◘ Google App Engine
◘ Microsoft Azure App Services
IAAS
● IAAS stands for Infrastructure as a Service.
● IaaS provides virtualized computing resources over the internet, including servers,
storage, and networking.
● It is the most fundamental level of cloud service, offering essential infrastructure
components.
● IAAS is the delivery of technology infrastructure as an on demand scalable service.
● IaaS provides access to fundamental resources such as physical machines, virtual
machines, virtual storage, etc.
● Usually billed/cost based on usage
● Usually multi tenant virtualized environment
● Can be coupled with Managed Services for OS and application support
How It Works:
● IaaS provides a virtual data center for users, where they can run and manage virtual
machines (VMs) and other resources.
● The users have control over the operating system, applications, and storage while the
cloud provider manages the hardware.
EXAMPLES OF IAAS:-
◘ Amazon Web Services (AWS EC2)
◘ Microsoft Azure Virtual Machines
◘ Google Cloud Platform (Compute Engine)
◘ at&t
Cloud Storage
● Cloud storage is a key component of cloud computing that enables users to store,
manage, and access data over the internet.
● Unlike traditional local storage on personal computers or physical servers, cloud storage
provides a scalable, secure, and flexible solution for data management.
● Create an Account User name and password.
● Content lives with the account in the cloud.
● Log onto any computer with Wi-Fi to find your content.
● Data is stored in a virtual environment and can be managed through web-based interfaces
or APIs.
● Users can access their data via the internet, using various devices such as computers,
smartphones, and tablets.
1. Client Layer
○ Users interact with cloud storage through web browsers, mobile apps, or APIs.
○ This layer provides interfaces for data upload, retrieval, and management.
2. Application Layer
● This layer includes applications and services that manage data storage, retrieval,
and processing.
● It may involve APIs that allow developers to integrate cloud storage into their
applications.
3. Storage Layer
● The actual storage infrastructure resides here, including storage devices,
databases, and file systems.
● Data is distributed across multiple physical servers to ensure redundancy and high
availability.
4. Network Layer
● This layer encompasses the network connections that enable communication
between clients and the storage infrastructure, ensuring data is transmitted securely
and efficiently.
1. Object Storage:-
● Stores data as objects, which include the data itself, metadata, and a unique
identifier.
● This is suitable for unstructured data like images, videos, and backups.
● Example: Amazon S3, Google Cloud Storage.
2. Block Storage:-
● Divides data into blocks and stores it as separate units, similar to traditional storage
on hard drives.
● It is typically used for applications that require fast access to data, such as
databases.
● Example: Amazon EBS (Elastic Block Store), Azure Managed Disks.
3. File Storage:-
○ Provides a hierarchical file system for storing and managing files.
○ This is ideal for shared file storage and collaborative applications.
○ Example: Azure Files, Google Cloud Filestore.
2. Large Enterprises:
3. E-commerce Companies:
4. Healthcare Organizations:
5. Educational Institutions:
6. Financial Services:
● Require secure, compliant, and resilient infrastructure for transactions.
● Hybrid clouds with critical systems on-premises/private and non-critical in public clouds.
Monitoring:
1. Database monitoring : Analyzes data integrity availability, querying, access, and how your
application uses this data.
2.Virtual machine monitoring: Includes monitoring health, as well as traffic logs and
scalability.
3.Cloud storage monitoring: Tracks and manages the data stored in a cloud environment.
4. Virtual network monitoring: Creates virtual versions of important network elements, namely
firewalls, routers, and load balancers.
5.Cloud sever monitoring: Tracks metrics such as CPU utilization, memory usage, and disk
input to identify potential problems early.
(3)Target Users End-users and Developers and teams. IT admins and businesses.
businesses.
(5)Cost Subscription- based. Pay for resources used. Pay for infrastructure.
(6)Use cases Email, CRM, file App development, Hosting, storage, backup.
storage. testing.
(7)Examples Google Workspace, Heroku, Google App Amazon EC2, Azure VMs
Dropbox Engine
(2)Private Cloud
Definition: Resources are dedicated to a single organization.
→ Private Cloud allows systems and services to be accessible within an organization.
Characteristics: Offers more control and security.
Hosting Options: Can be on-premises or managed by a third-party provider.
Service Models
(1)SAAS (2)PAAS (3)IAAS
Deployment Steps
● Preparation: Assess application requirements, choose the appropriate cloud service
model, and select a cloud provider.
● Development: Build the application using cloud-compatible technologies and frameworks.
Consider microservices architecture for better scalability.
● Testing: Conduct thorough testing in a staging environment to ensure application
performance, security, and reliability.
● Deployment: Deploy the application to the chosen cloud environment, using automated
tools and scripts for continuous integration and continuous deployment (CI/CD).
● Monitoring and Maintenance: Utilize monitoring tools to track application performance,
availability, and security. Regular updates and maintenance ensure the application runs
smoothly.
● In Web services, SOAP allows the user request to interact with other programming
languages.
● SOAP is a protocol as it has some strict rules for data format &Communication.
● It manages the recods and maintain the state between the requests.
Usage of SOAP:- Features of SOAP :-
(1)Security (1)Complexity
(4)Protocol Flexibility
(1) Envelope:- Defines the message structure and wraps the entire SOAP message.
ervice.
• All web services are based on the REST; hence it is called a RESTful service.
• The purpose of developing a RESTful web service is to make the web service more effective.
• It does not depend on a specific protocol to use, but it's used HTTP/HTTPS.
• It is a set of constraints used to create a lightweight, scalable, and maintainable web service
• POST: Create new data on the server (e.g., adding a new resource).
○ Client-Server
○ Stateless Server
○ Cacheable
○ Uniform Interface
○ Layered System
1. Client-Server Model:
○ Client: Client machines or users send a special request to the webserver and wait for the
○ Server: Server is the collection of web resources that provides different services to
multiples clients. It receives multiples requests from the client machines and responds to that
2.Stateless Server :- Each request from the client contains all necessary information.
4. Uniform Interface:- Standardized way of interacting with resources using HTTP methods
5. Layered System:- Supports layers like proxy servers, firewalls, and caches to improve
(3) Message Format Always XML(envelopes) JSON, XML, plain text, etc.
AJAX
Where it is used?
There are too many web applications running on the web that are using ajax technology like
gmail, facebook,twitter, google map, youtube etc.
● Mashup refers to the integration of different services and data sources to create a new
application or service, often enhancing user experience and functionality.
● In the context of user interface service virtualization technology, especially related to
virtual machine (VM) technology in cloud computing, the following points highlight its
significance:
Key Concepts
1. Service Virtualization:
○ Enables developers to mimic the behavior of services that are unavailable or hard
to access.
○ Allows for smoother testing processes by providing access to service-like
behaviors.
2. User Interface (UI) Mashups:
○ Combines data from multiple sources (APIs, web services).
○ Enables the creation of applications that integrate various functionalities.
○ Allows for creative and diverse application designs.
3. Virtual Machine Technology:
○ Multiple VMs run on a single physical server, maximizing hardware utilization.
○ Easy to scale applications up or down by adding or removing VMs as needed.
○ Simplifies backup and recovery processes by enabling snapshots and cloning of
VMs.
Types of Virtualization
● Server Virtualization: Divides physical servers into multiple virtual servers, maximizing
resource utilization.
● Storage Virtualization: Pools physical storage from multiple devices into a single
storage resource.
● Network Virtualization: Combines network resources into a single, virtualized network,
allowing for easier management and scalability.
● Desktop Virtualization: Allows users to access desktop environments hosted on a
centralized server.
Features Uses
Advantages Disadvantage
1. Scalability (1)Security Vulnerabilities
2. Flexibility (2)Complexity in Management
3. Cost Efficiency (3)Performance Overhead
4. Enhanced Security
5. Quick Deployment
Data Access Control for Enterprise Applications
● Data access control is a critical component of security in cloud computing, especially for
enterprise applications that handle sensitive information.
● It ensures that only authorized users have access to specific data and resources, helping
to protect against data breaches and unauthorized access.
Access Control Models Technologies and Tools
(1)Role-Based Access Control (1)IAM solutions
(2)Attribute-Based Access Control (2)Access Control Lists
(3)Mandatory Access Control (3)Data Loss Prevention