CC-Unit-1
CC-Unit-1
UNIT I
Introduction: Definition, characteristics, components, Cloud service
provider, the role of networks in Cloud computing, Cloud deployment
models- private, public & hybrid, Cloud service models, multitenancy.
Virtualization: Virtualization technologies and Architectures, Desktop
Virtualization, Server virtualization, Storage virtualization, Network
virtualization, Service virtualization, Data Virtualization. Hypervisors:
KVM, Xen, VMware hypervisors and their features.
Definition of Cloud Computing
• Cloud computing meaning in a simple term, it is
delivering the computing service which includes
high end servers,
storage for the service opted,
managing the database,
networking,
necessary software used for the purpose, analytics &
intelligence,
running over an internet connection.
• Cloud computing is the on-demand delivery of IT resources over the
Internet with pay-as-you-go pricing. These resources run on server
computers that are located in large data centers in different locations
around the world. When you use a cloud service provider like AWS,
that service provider owns the computers that you are using. These
resources can be used together like building blocks to build solutions
that help meet business goals and satisfy technology requirements.
"The cloud" refers to servers that are
accessed over the Internet, and the software
and databases that run on those servers.
Cloud servers are located in data
centers all over the world. By using cloud
computing, users and companies do not
have to manage physical servers
themselves or run software applications on
their own machines.
It works the same way with cloud email providers like Gmail or
Microsoft Office 365, and with cloud storage providers like Dropbox or
Google Drive.
Who is using cloud computing?
For example,
Healthcare companies are using the cloud to develop more
personalized treatments for patients. Financial services
companies are using the cloud to power real-time fraud detection
and prevention.
And video game makers are using the cloud to deliver online
games to millions of players around the world.
Features / Properties / Characteristics of Cloud
Computing 1. Resources Pooling
The IT resource (e.g.,
networks, servers, storage,
applications, and services) present
are shared across multiple
applications and occupant in an
uncommitted manner. Multiple
clients are provided service from a
same physical resource.
2. On-Demand Self-Service
The Cloud computing
4. Large Network Access services does not require any
The user can access the data of the cloud or human administrators, user
upload the data to the cloud from anywhere just with themselves are able to provision,
the help of a device and an internet connection. monitor and manage computing
5. Availability resources as needed.
The capabilities of the Cloud can be 3. Easy Maintenance
modified as per the use and can be extended a lot. It The servers are easily
analyzes the storage usage and allows the user to buy maintained and the downtime is
extra Cloud storage if needed for a very small amount. very low. Cloud Computing comes
up with an update every time by
gradually making it better.
Features / Properties / Characteristics of Cloud
6. Automation
Computing Cloud computing services
are often highly automated,
allowing users to deploy and
manage resources with minimal
manual intervention.
7. Economical
In cloud computing,
clients need to pay the third-party
for the space used by them. More
often, some space is allocated for
9. Pay as you go free.
In cloud computing, the user has to pay 8. Security
only for the service or the space they have utilized. It creates a snapshot of
There is no hidden or extra charge which is to be the data stored so that the data may
paid. The service is economical and most of the time not get lost even if one of the
some space is allotted for free. servers gets damaged.
10. Measured service: The data is stored within the storage
The resource utilization is tracked for each devices, which cannot be hacked
application and occupant, it will provide both the and utilized by any other person.
user and the resource provider with an account of The storage service is quick and
what has been used. This is done for various reasons reliable.
like monitoring billing and effective use of resource.
Components of Cloud Computing Architecture
cloud computing technology is used by both small and large organizations to store
the information in cloud and access it from anywhere at anytime using the internet
connection.
Cloud computing architecture is a combination of service-oriented architecture and event-
driven architecture.
Front End
Back End
Front End
The front end is used by the client. It contains client-side interfaces and applications that
are required to access the cloud computing platforms. The front end includes web servers
(including Chrome, Firefox, internet explorer, etc.), thin & fat clients, tablets, and mobile
devices.
Back End
The back end is used by the service provider. It manages all the resources that are required
to provide cloud computing services. It includes a huge amount of data storage, security
mechanism, virtual machines, deploying models, servers, traffic control mechanisms, etc.
Components of Cloud Computing Architecture
There are the following components of cloud computing architecture -
1. Client Infrastructure
Client Infrastructure is a Front end component. It provides GUI (Graphical User Interface) to
interact with the cloud.
2. Application
The application may be any software or platform that a client wants to access.
3. Service
A Cloud Services manages that which type of service you access according to the client’s
requirement.
Mostly, SaaS applications run directly through the web browser means we do not require to
download and install these applications.
Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE), Cisco
Metapod.
4. Runtime Cloud
Runtime Cloud provides the execution and runtime environment to the virtual
machines.
5. Storage
It provides services on the host level, application level, and network level.
7. Management
8. Security
Security is an in-built back end component of cloud computing. It implements a security
mechanism in the back end.
9. Internet
The Internet is medium through which front end and back end can interact and
communicate with each other.
Cloud service provider:
Companies like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud
Platform (GCP) are leading the pack.
They offer a wide range of services that help businesses be more creative and grow.
Using cloud technology is a smart move for any business wanting to stay ahead in today’s
digital world.
It becomes a major player in AI, database, machine learning, 5G cloud, multi-cloud and
serverless deployments. AWS operates in 20 geographical regions across the world.
Microsoft Azure
Microsoft Azure was launched in 2010 as Windows Azure, and later in 2014, it was
renamed, Microsoft Azure.
It was launched years after the release of AWS and Google cloud but still, it is the
fastest-growing cloud and giving tough competition to AWS and other cloud service
providers.
Kamatera
Kamatera, established over two decades ago, has evolved into one of the most
reliable and flexible cloud infrastructure platforms in the industry.
Alibaba Cloud
Alibaba Cloud, also known as Aliyun, is the cloud computing arm of Alibaba Group,
one of the world’s largest e-commerce and technology conglomerates based in
China. It offers a comprehensive suite of cloud computing services to support
businesses worldwide
Oracle Cloud
IBM’s best bets come in the form of the Internet of Things, Cognitive Computing and
Blockchain
Tencent Cloud
DigitalOcean is a well-known cloud hosting provider that currently holds the fourth
largest global market share in cloud computing, following Alibaba Cloud, AWS, and
Microsoft Azure.
It Has a strong presence in China and Southeast Asia, with growing international
reach.
OVHcloud
DigitalOcean is a well-known cloud hosting provider that currently holds the sixth
largest global market share in cloud computing, following Alibaba Cloud, AWS,
Microsoft Azure, Tencent Cloud, and Google Cloud Platform.
Known as a strong player in Europe, particularly in France, and is expanding its
global presence.
DigitalOcean:
DigitalOcean is a well-known cloud hosting provider that primarily caters to startups, small and
medium-sized businesses (SMBs), and individual developers, holding a smaller market share
compared to larger cloud providers.
Linode, which is now part of Akamai, is a cloud platform primarily caters to developers,
startups, and SMBs, holding a smaller market share compared to major cloud providers.
Cloud Computing is source management in which more than one computing resources share an
identical platform and customers are additionally enabled to get entry to these resources to a
specific extent.
Cloud deployment
Model
Cloud deployment models
It is often defined as the place where the deployment will take place.
Public cloud
Most of all, public clouds are used for file-sharing, e-mail services, application
development, and testings.
Today, workforces can work and access data from almost anywhere in the
world, redefining how many companies operate and collaborate.
Public cloud storage options also provide enhanced security and backup
capabilities.
In the case of server failure or corruption, data uploaded to the cloud remains
intact.
Private cloud
Hybrid Cloud is a mixture of public and private cloud. Non-critical activities are
performed using public cloud while the critical activities are performed using private
cloud. It allows instant transfer of information between environments, allowing
enterprises to experience the benefits of both environments.
For example,
For backup and disaster recovery purposes, a private cloud can be used as
a local backup solution ensuring immediate on-site access to corporate data (and its
protection) – especially in the context of GDPR compliance.
On the other hand, the public cloud can function as the secondary off-site
backup location that provides disaster recovery in the event of on-premises equipment
failures.
Features and Benefits of the Hybrid Cloud Model
Scalability: Moving non-sensitive functions to Security: The hybrid cloud model not only
the public cloud allows customers to achieve ensures the security required for sensitive
seamless scalability operations but also satisfies the data handling
while also reducing the demands on the private and storage regulatory requirements, wherever
cloud. applicable.
Flexibility: Customers can explore different Cost efficiency: Hybrid clouds enable greater
operational avenues and achieve efficient cost efficiency through centralized
management of their databases and applications management
on account of the flexibility offered by the
hybrid cloud.
Community cloud
Identity
Access
Management
While IaaS gives you virtualized resources such as servers, disks, networks,
and IP addresses, we are still responsible for administering the operating
system, data, applications, middleware and runtimes.
A PaaS provider hosts the hardware and software on its own infrastructure. With
PaaS, developers can focus on building their applications without having to worry about
operating systems, software updates, storage or infrastructure.
We get a “platform” with built-in software components for both hardware and
software such as runtime libraries, tools, applications, email and HTTP servers. This
allows developers to rapidly develop, run, and manage their own apps without having to
build and maintain the infrastructure
This setup significantly reduces the overhead costs of app development. It also makes
it possible for distributed teams of developers to work together on an app from
anywhere in the world
Examples of PaaS may include
• runtimes such as Java runtimes,
• databases such as mySQL or Oracle, and
• web servers such as Tomcat.
Another example is Google App Engine, on which one can develop applications and let them
execute on Google’s platform. Other commonly-cited examples include AWS Elastic
Beanstalk, Windows Azure, Heroku, Force.com, and Apache Stratos.
Software as a Service (SaaS): Ready-to-Use Applications
Software-as–a-Service (SaaS) model allows to provide software application
as a service to the end users. It refers to a software that is deployed on a host service
and is accessible via Internet. Instead of installing and maintaining software, we
simply access it via the Internet, freeing yourself from complex software and
hardware management.
There are several SaaS applications
Software as a Service (SaaS): Ready-to-Use Applications
Software as a Service (SaaS) is a web-based software deployment model
that makes the software accessible through a web browser. As a user of SaaS
software, we don’t care where the software is hosted, which operating system
it uses, or which language it is written in.
The SaaS software is made accessible from any device as long we have an
internet connection. With SaaS, we do not incur the capital cost of buying servers
or software.
It means that multiple customers of cloud vendor are using the same computing
resources.
As they are sharing the same computing resources but the data of each Cloud
customer is kept totally separate and secure.
In cloud computing Multitenancy also refer as shared host where
same resources are divided among different customer’s.
Advantages of Multitenancy :
The use of Available resources is maximized by sharing resources.
Customer's Cost of Physical Hardware System is reduced, and it reduces the
usage of physical devices and thus power consumption and cooling cost
savings.
Save Vendor's cost as it becomes difficult for a cloud vendor to provide
separate Physical Services to each individual.
Disadvantages of Multitenancy :
Data is stored in third-party services, which reduces our data security and puts
it into vulnerable conditions.
Virtualization Layer:
Software to manage
the VM
HOST Machine
Virtualization Architecture
Hypervisor
The hypervisor is a software component that manages multiple
virtual machines in a computer.
It ensures that each virtual machine gets the allocated resources and
does not interfere with the operation of other virtual machines.
Virtual machine:
• A virtual machine is a software-defined computer that runs on a physical computer
with a separate operating system and computing resources. The physical computer is
called the host machine and virtual machines are guest machines. Multiple virtual
machines can run on a single physical machine. Virtual machines are abstracted
from the computer hardware by a hypervisor.
• From the user’s perspective, the virtual machine operates like a typical server. It has
settings, configurations, and installed applications. Computing resources, such as
CPUs, RAM, and storage appear the same as on a physical server. You can also
configure and update the guest operating systems and their applications as necessary
without affecting the host operating system.
You can give resources to Virtual Machine with what actually you
have in the host machine.
For eg if you have total 8GB RAM in the host machine and host machine
is utilizing 4GB then the remaining 4GB RAM can be shared among the
Virtual Machines we create.
Virtual Machines are completely Isolated - If something breaks in
one virtual machine, it will not affect the Host machine and other
VMs.
Bre
ak
Types of Virtualization
Types of Virtualization
In cloud computing, there are several types of virtualization techniques. Each type of
virtualization has a specific purpose and plays a crucial role in building flexible and scalable
cloud environments. The main types of virtualization in cloud computing are:
1. Server Virtualization:
Server virtualization is the process of creating multiple virtual servers on a single
physical server. Virtual servers are isolated from each other and may have different sets of
software and operating systems. Since they are consolidated on a single physical machine,
you can use resources more efficiently, and save money.
Instead of several servers, the company buys one, powerful Server. There is no need to
allocate separate physical machines for mail, files, domain servers, etc.
SE
RV
ER
2. Storage Virtualization:Types of Virtualization
Storage virtualization combines the functions
of physical storage devices such as network attached
storage (NAS) and storage area network (SAN).
You can pool the storage hardware in your
data center, even if it is from different vendors or of
different types.
Storage virtualization uses all your physical
data storage and creates a large unit of virtual
storage that you can assign and control by using
management software.
IT administrators can streamline storage
activities, such as archiving, backup, and recovery,
because they can combine multiple network storage
Types of Virtualization
3. Network Virtualization:
Any computer network has hardware elements such
as switches, routers, and firewalls.
An organization with offices in multiple
geographic locations can have several different
network technologies working together to create its
enterprise network.
Network virtualization is a process that
combines all of these network resources to
centralize administrative tasks. Administrators
can adjust and control these elements virtually
without touching the physical components, which
greatly simplifies network management.
Types of Virtualization
4. Application Virtualization:
In this Virtualization, all the individual
elements, characteristics, and information of an
application is stored on a server.
This system enables users to access and use the
application from this server.
This system basically encapsulates all the elements of a
particular application and virtualizes them on another
server which enables user access to these applications
without the need of actually installing it on the target
device.
This virtualization separates the application
from the underlying operating system, making it
accessible from multiple devices without being
directly installed on them.
For example, users can run a Microsoft Windows
application on a Linux machine without changing the
machine configuration.
Users can access and interact with the
application from any device connected to the network
Types of Virtualization
5. Desktop Virtualization:
The entire desktop operating system,
applications, and data are hosted on a cloud server,
and users can access their desktop from any device
over the internet.
The desktop environments, also called virtual
machines (VMs), are housed on powerful servers that
can host several desktop sessions concurrently.
Users can access these VMs on their devices as
and when required, regardless of the specifications of
their devices.
Desktop virtualization is especially useful for
enterprises as it offers a consistent desktop experience
to all employees.
IT teams responsible for managing a company’s
devices can now manage and issue updates centrally.
Virtual desktops also minimize the security
risks associated with employees storing the company
data locally. And, since most of the data is stored on
servers, device failure will not result in any major loss.
Types of Virtualization
6. Data Virtualization:
This is the kind of virtualization in which the data is collected from various sources
and managed at a single place without knowing more about the technical
information like how data is collected, stored & formatted then arranged that data
logically so that its virtual view can be accessed by its interested people and
stakeholders, and users through the various cloud services remotely. Many big giant
companies are providing their services like Oracle, IBM, At scale, Cdata, etc.
Hypervisor
Hypervisor:
The hypervisor is a software component that manages multiple
virtual machines in a computer. It ensures that each virtual machine gets
the allocated resources and does not interfere with the operation of
other virtual machines.
There are two types of hypervisors.
• Type 1 hypervisor
• Type 2 hypervisor
Hypervisor
Type 1 hypervisor (bare-metal
hypervisor) :
A type 1 hypervisor, or bare-metal
hypervisor, is a hypervisor program
installed directly on the computer’s
hardware instead of the operating system.
2. Storage flexibility
KVM is able to use any storage format supported by Linux, including some local
disks and network-attached storage (NAS).
4. Live migration
KVM supports live migration, which is the ability to move a running VM from
one physical host to another without shutting down or interrupting the VM's operation..
The VM remains powered on, network connections remain active, and applications continue
to run while the VM is relocated. KVM also saves a VM's current state so it can be stored and
resumed later.
KVM Hypervisor
Why is KVM important?
High performance
KVM is engineered to manage high-demanding applications seamlessly. All
guest operating systems inherit the high performance of the host operating
system—Linux. The KVM hypervisor also allows virtualization to be
performed as close as possible to the server hardware, which further reduces
process latency.
Security
Virtual machines running on KVM enjoy security features native to the
Linux operating system, including Security-Enhanced Linux (SELinux).
This ensures that all virtual environments strictly adhere to their respective
security boundaries to strengthen data privacy and governance.
KVM Hypervisor
Stability
KVM has been widely used in business applications for more than a decade. It enjoys
excellent support from a thriving open-source community. The source code that powers
KVM is mature and provides a stable foundation for enterprise applications.
Cost efficiency
KVM is free and open source, which means businesses do not have to pay additional
licensing fees to host virtual machines.
Flexibility
KVM provides businesses many options during installations, as it works with various
hardware setups. Server administrators can efficiently allocate additional CPU, storage, or
memory to a virtual machine with KVM. KVM also supports thin provisioning, which
only provides the resources to the virtual machine when needed.
Xen Hypervisor
The Xen hypervisor, is the open
source open-source type-1 or baremetal
hypervisor, it supports a wide range of guest
operating systems including Windows, Linux,
Solaris
Para Virtualization:
In the para virtualization the kernel of the guest
operating system modified to run on the hypervisor
hypervisor is a program that runs on the host system at ring 0
therefore is also called a modified guest.
The normal goal of virtualization is to fool the guest
OS kernel into thinking it’s running on the real hardware. But in
para virtualization, the guest OS knows that it is running in a
virtual machine and cooperates with the hypervisor to get
access to the actual hardware. The hypervisor contains a set of
paravirtualized (PV) drivers that the guest loads instead of the
actual hardware drivers.
1. VMware ESXi
VMware ESXi is a data-center-focused Type 1 or "bare metal"
hypervisor, replacing the primary operating system that would interact with a
computer's physical components. ESXi, a larger hypervisor that used more of the
host computer's resources.
Large-scale enterprise data centers, cloud infrastructures, and virtualized
environments use this hypervisor
2. VMware vSphere Hypervisor
VMware vSphere Hypervisor is a Type 1 or "bare metal" hypervisor. It is
essentially a free version of VMware ESXi. It provides essential virtualization capabilities but
lacks some of the advanced features available in the full vSphere suite, such as centralized
management (vCenter) and certain enterprise features.
It's suitable for small businesses or individuals who need basic virtualization features.
4. VMware Fusion
Similar to VMware Workstation, VMware Fusion is designed specifically for
macOS users. It enables Mac users to run virtual machines with other operating systems (such
as Windows, Linux, and others) alongside macOS. Fusion is ideal for running virtualized
environments on Mac computers for development, testing, and educational purposes.
It is used for Virtualization on Mac computers, development, and testing