SlideShare uma empresa Scribd logo
1 de 6
Abstract: Cloud computing relies on sharing of
resources to achieve coherence and economies of
scale, similar to a utility (like the electricity grid) over
a network. At the foundation of cloud computing is
the broader concept of converged
infrastructure and shared services.
The cloud also focuses on maximizing the
effectiveness of the shared resources. Cloud resources
are usually not only shared by multiple users but are
also dynamically reallocated per demand. This can
work for allocating resources to users. For example, a
cloud computer facility that serves European users
during European business hours with a specific
application (e.g., email) may reallocate the same
resources to serve North American users during
North America's business hours with a different
application (e.g., a web server). This approach should
maximize the use of computing powers thus reducing
environmental damage as well since less power, air
conditioning, rackspace, etc. is required for a variety
of functions. With cloud computing, multiple users
can access a single server to retrieve and update their
data without purchasing licenses for different
applications.
Keywords: Cloud computing, virtualization, SaaS,
PaaS,IaaS, Types of cloud computing.
I.INTRODUCTION
In computer networking, cloud computing is a
phrase used to describe a variety
of computing concepts that involve a large number
of computers connected through a
communication networksuch as the Internet. It is
very similar to the concept of utility computing. In
science, cloud computing is a synonym
for distributed computing over a network, and
means the ability to run a program or application
on many connected computers at the same time.
The phrase is often used in reference to network-
based services, which appear to be provided by real
server hardware, and are in fact served up by
virtual hardware, simulated by software running on
one or more real machines. Such virtual servers do
not physically exist and can therefore be moved
around and scaled up or down on the fly without
affecting the end user, somewhat like a cloud
becoming larger or smaller without being a
physical object.
In common usage, the term "the cloud" is
essentially a metaphor for the Internet. Marketers
have further popularized the phrase "in the cloud"
to refer to software, platforms and infrastructure
that are sold "as a service", i.e. remotely through
the Internet. Typically, the seller has actual energy-
consuming servers which host products and
services from a remote location, so end-users don't
have to; they can simply log on to the network
without installing anything. The major models of
cloud computing service are known as software as
a service, platform as a service, andinfrastructure as
a service. These cloud services may be offered in a
public, private or hybrid network.
Google, Amazon, OracleCloud, Salesforce, Zoho,
Access2MyPC, and Microsoft Azure are some
well-known cloud vendors
II. History of Cloud Computing.
a. The 1950s
The underlying concept of cloud computing dates
back to the 1950s, when large-scale mainframe
computers became available in academia and
corporations, accessible via thin
clients/terminalcomputers, often referred to as
"static terminals", because they were used for
communications but had no internal processing
capacities. To make more efficient use of costly
mainframes, a practice evolved that allowed
multiple users to share both the physical access to
the computer from multiple terminals as well as to
share the CPU time. This eliminated periods of
inactivity on the mainframe and allowed for a
greater return on the investment. The practice of
sharing CPU time on a mainframe became known
in the industry as time-sharing. During mid 70s it
was popularly known as RJE Remote Job
Entry process mostly associated with IBM and
DEC.
b. The 1960s–1990s
John McCarthy opined in the 1960s that
"computation may someday be organized as
a public utility." Almost all of the modern-day
characteristics of cloud computing (elastic
provision, provided as a utility, online, illusion of
infinite supply), the comparison to the electricity
industry and the use of public, private, government,
and community forms, were thoroughly explored
inDouglas Parkhill's 1966 book, The Challenge of
the Computer Utility. Other scholars have shown
that cloud computing's roots go all the way back to
Cloud Computing And Virtualization
the 1950s when scientist Herb Grosch (the author
of Grosch's law) postulated that the entire world
would operate on dumb terminals powered by
about 15 large data centers. Due to the expense of
these powerful computers, many corporations and
other entities could avail themselves of computing
capability through time sharing and several
organizations, such as GE's GEISCO, IBM
subsidiary The Service Bureau Corporation (SBC,
founded in 1957), Tymshare (founded in 1966),
National CSS (founded in 1967 and bought by Dun
& Bradstreet in 1979), Dial Data (bought by
Tymshare in 1968), and Bolt, Beranek and
Newman (BBN) marketed time sharing as a
commercial venture.
c. The 1990s
In the 1990s, telecommunications companies, who
previously offered primarily dedicated point-to-
point data circuits, began offering virtual private
network (VPN) services with comparable quality of
service, but at a lower cost. By switching traffic as
they saw fit to balance server use, they could use
overall network bandwidth more effectively. They
began to use the cloud symbol to denote the
demarcation point between what the provider was
responsible for and what users were responsible
for. Cloud computing extends this boundary to
cover servers as well as the network infrastructure.
As computers became more prevalent, scientists
and technologists explored ways to make large-
scale computing power available to more users
through time sharing, experimenting with
algorithms to provide the optimal use of the
infrastructure, platform and applications which
prioritized the CPU and efficiency for the end
users.
d. Since 2000
After the dot-com bubble, Amazon played a key
role in all the development of cloud computing by
modernizing their data centers, which, like
most computer networks, were using as little as
10% of their capacity at any one time, just to leave
room for occasional spikes. Having found that the
new cloud architecture resulted in significant
internal efficiency improvements whereby small,
fast-moving "two-pizza teams" (teams small
enough to feed with two pizzas) could add new
features faster and more easily, Amazon initiated a
new product development effort to provide cloud
computing to external customers, and
launched Amazon Web Services (AWS) on a utility
computing basis in 2006.
In early 2008, Eucalyptus became the first open-
source, AWS API-compatible platform for
deploying private clouds. In early
2008, OpenNebula, enhanced in the RESERVOIR
European Commission-funded project, became the
first open-source software for deploying private
and hybrid clouds, and for the federation of clouds.
In the same year, efforts were focused on
providingquality of service guarantees (as required
by real-time interactive applications) to cloud-
based infrastructures, in the framework of the
IRMOS European Commission-funded project,
resulting to a real-time cloud environment. By mid-
2008, Gartner saw an opportunity for cloud
computing "to shape the relationship among
consumers of IT services, those who use IT
services and those who sell them" and observed
that "organizations are switching from company-
owned hardware and software assets to per-use
service-based models" so that the "projected shift to
computing ... will result in dramatic growth in IT
products in some areas and significant reductions in
other areas."
On March 1, 2011, IBM announced the IBM
SmartCloud framework to support Smarter Planet.
Among the various components of the Smarter
Computing foundation, cloud computing is a
critical piece.
On June 7, 2012, Oracle announced the Oracle
Cloud. While aspects of the Oracle Cloud are still
in development, this cloud offering is posed to be
the first to provide users with access to an
integrated set of IT solutions, including the
Applications (SaaS), Platform (PaaS), and
Infrastructure (IaaS) layers.
III. Characteristics
Cloud computing exhibits the following key
characteristics:
Agility improves with users' ability to re-
provision technological infrastructure
resources.
Application programming interface (API)
accessibility to software that enables machines
to interact with cloud software in the same
way that a traditional user interface (e.g., a
computer desktop) facilitates interaction
between humans and computers. Cloud
computing systems typically use
Representational State Transfer (REST)-based
APIs.
Cost: cloud providers claim that computing
costs reduce. A public-cloud delivery model
converts capital expenditure to operational
expenditure. This purportedly lowers barriers
to entry, as infrastructure is typically provided
by a third-party and does not need to be
purchased for one-time or infrequent intensive
computing tasks. Pricing on a utility
computing basis is fine-grained, with usage-
based options and fewer IT skills are required
for implementation (in-house). The e-FISCAL
project's state-of-the-art repository contains
several articles looking into cost aspects in
more detail, most of them concluding that
costs savings depend on the type of activities
supported and the type of infrastructure
available in-house.
Device and location independenceenable
users to access systems using a web browser
regardless of their location or what device they
use (e.g., PC, mobile phone). As infrastructure
is off-site (typically provided by a third-party)
and accessed via the Internet, users can
connect from anywhere.
Virtualization technology allows sharing of
servers and storage devices and increased
utilization. Applications can be easily
migrated from one physical server to another.
Multitenancy enables sharing of resources
and costs across a large pool of users thus
allowing for:
o centralization of infrastructure in
locations with lower costs (such as real
estate, electricity, etc.)
o peak-load capacity increases (users need
not engineer for highest possible load-
levels)
o utilisation and efficiency improvements
for systems that are often only 10–20%
utilised.
Reliability improves with the use of multiple
redundant sites, which makes well-designed
cloud computing suitable for business
continuity and disaster recovery.
Scalability and elasticity via dynamic ("on-
demand") provisioning of resources on a fine-
grained, self-service basis near real-
time[46]
(Note, the VMstartup time varies by
VM type, location, os and cloud providers),
without users having to engineer for peak
loads.
Performance is monitored, and consistent and
loosely coupled architectures are constructed
using web services as the system interface.
Security can improve due to centralization of
data, increased security-focused resources,
etc., but concerns can persist about loss of
control over certain sensitive data, and the lack
of security for stored kernels. Security is often
as good as or better than other traditional
systems, in part because providers are able to
devote resources to solving security issues that
many customers cannot afford to
tackle. However, the complexity of security is
greatly increased when data is distributed over
a wider area or over a greater number of
devices, as well as in multi-tenant systems
shared by unrelated users. In addition, user
access to security audit logs may be difficult
or impossible. Private cloud installations are in
part motivated by users' desire to retain control
over the infrastructure and avoid losing control
of information security.
Maintenance of cloud computing applications
is easier, because they do not need to be
installed on each user's computer and can be
accessed from different places.
The National Institute of Standards and
Technology's definition of cloud computing
identifies "five essential characteristics":
On-demand self-service. A consumer can
unilaterally provision computing capabilities, such
as server time and network storage, as needed
automatically without requiring human interaction
with each service provider.
Broad network access. Capabilities are available
over the network and accessed through standard
mechanisms that promote use by heterogeneous
thin or thick client platforms (e.g., mobile phones,
tablets, laptops, and workstations).
Resource pooling. The provider's computing
resources are pooled to serve multiple consumers
using a multi-tenant model, with different physical
and virtual resources dynamically assigned and
reassigned according to consumer demand.
Rapid elasticity. Capabilities can be elastically
provisioned and released, in some cases
automatically, to scale rapidly outward and inward
commensurate with demand. To the consumer, the
capabilities available for provisioning often appear
unlimited and can be appropriated in any quantity
at any time.
Measured service. Cloud systems automatically
control and optimize resource use by leveraging a
metering capability at some level of abstraction
appropriate to the type of service (e.g., storage,
processing, bandwidth, and active user accounts).
Resource usage can be monitored, controlled, and
reported, providing transparency for both the
provider and consumer of the utilized service.
Fig 1: Uses of Internet for cloud computing
IV. Service Models
Cloud computing providers offer their services
according to several fundamental models:
infrastructure as a service (IaaS), platform as a
service (PaaS), and software as a service (SaaS)
where IaaS is the most basic and each higher model
abstracts from the details of the lower models.
Other key components in anything as a service
(XaaS) are described in a comprehensive taxonomy
model published in 2009, such as Strategy-as-a-
Service, Collaboration-as-a-Service, Business
Process-as-a-Service, Database-as-a-Service, etc. In
2012, network as a service (NaaS) and
communication as a service (CaaS) were officially
included by ITU (International Telecommunication
Union) as part of the basic cloud computing
models, recognized service categories of a
telecommunication-centric cloud ecosystem.
Fig 2: Service Models
a. Infrastructure as a service (IaaS)
In the most basic cloud-service model, providers of
IaaS offer computers – physical or (more often)
virtual machines – and other resources.
(A hypervisor, such as Hyper-
V or Xen or KVM or VMware ESX/ESXi, runs the
virtual machines as guests. Pools of hypervisors
within the cloud operational support-system can
support large numbers of virtual machines and the
ability to scale services up and down according to
customers' varying requirements.) IaaS clouds often
offer additional resources such as a virtual-
machine disk image library, raw (block) and file-
based storage, firewalls, load balancers, IP
addresses, virtual local area networks(VLANs), and
software bundles. IaaS-cloud providers supply
these resources on-demand from their large pools
installed in data centers. For wide-
area connectivity, customers can use either the
Internet or carrier clouds (dedicated virtual private
networks).
To deploy their applications, cloud users install
operating-system images and their application
software on the cloud infrastructure. In this model,
the cloud user patches and maintains the operating
systems and the application software. Cloud
providers typically bill IaaSservices on a utility
computing basiscost reflects the amount of
resources allocated and consumed.
Cloud communications and cloud telephony, rather
than replacing local computing infrastructure,
replace local telecommunications infrastructure
with Voice over IP and other off-site Internet
services.
Fig 3: Infrastructure As A Service.
b. Platform as a service (PaaS)
In the PaaS models, cloud providers deliver
a computing platform, typically including operating
system, programming language execution
environment, database, and web server. Application
developers can develop and run their software
solutions on a cloud platform without the cost and
complexity of buying and managing the underlying
hardware and software layers. With some PaaS
offers like Windows Azure, the underlying
computer and storage resources scale automatically
to match application demand so that the cloud user
does not have to allocate resources manually. The
latter has also been proposed by an architecture
aiming to facilitate real-time in cloud
environments.
Fig 4: Platform As A Service
c. Software as a service (SaaS)
In the business model using software as a service
(SaaS), users are provided access to application
software and databases. Cloud providers manage
the infrastructure and platforms that run the
applications. SaaS is sometimes referred to as "on-
demand software" and is usually priced on a pay-
per-use basis. SaaS providers generally price
applications using a subscription fee.
In the SaaS model, cloud providers install and
operate application software in the cloud and cloud
users access the software from cloud clients. Cloud
users do not manage the cloud infrastructure and
platform where the application runs. This
eliminates the need to install and run the
application on the cloud user's own computers,
which simplifies maintenance and support. Cloud
applications are different from other applications in
their scalability—which can be achieved by cloning
tasks onto multiple virtual machines at run-time to
meet changing work demand. Load
balancers distribute the work over the set of virtual
machines. This process is transparent to the cloud
user, who sees only a single access point. To
accommodate a large number of cloud users, cloud
applications can be multitenant, that is, any
machine serves more than one cloud user
organization. It is common to refer to special types
of cloud-based application software with a similar
naming convention: desktop as a service, business
process as a service, test environment as a service,
communication as a service.
Fig 5: Software as a service
V. Virtualization.
―Virtualization, in computing, is the creation of a
virtual (rather than actual) version of something,
such as a hardware platform, operating system, a
storage device or network resources‖ Concept is
not new.
Multi Programming – Each Process thinks it has
complete control on all of the resources.
Virtual Memory
CPU Sharing
VI. Virtualization Architecture
OS assumes complete control of the underlying
hardware.
Virtualization architecture provides this
illusion through a hypervisor/VMM.
Hypervisor/VMM is a software layer
which:Allows multiple Guest OS (Virtual
Machines) to run simultaneously on a single
physical host.
Provides hardware abstraction to the running
Guest OSs and efficiently multiplexes
underlying hardware resources.
Fig 6: Virtualization Architectur
VII. Types Of Virtualization
Different types of hardware virtualization include:
 Full virtualization: Almost complete
simulation of the actual hardware to allow
software, which typically consists of a guest
operating system, to run unmodified.
In full virtualization, there is almost a
complete model of the underlying physical
system resources that allows any and all
installed software to run without
modification.
Fig 7: Full virtualization
 Partial virtualization: Some but not all of
the target environment is simulated. Some
guest programs, therefore, may need
modifications to run in this virtual
environment.
In partial virtualization, not everything in the
target environment becomes simulated. Not
all software programs installed on the guest
operating system can run unmodified.
 Paravirtualization: A hardware
environment is not simulated; however, the
guest programs are executed in their own
isolated domains, as if they are running on a
separate system. Guest programs need to be
specifically modified to run in this
environment.
With paravirtualization, any and all software
that is running on a virtual system will be
able to work directly on the underlying
physical system hardware. That is, the
software itself on the virtual machine's guest
operating system will be able to make calls
on the hardware directly instead of relying on
just the virtual machine to make the
necessary calls for it. Because of this,
performance is increased without the need to
sacrifice any computing power.
Fig 8:Paravirtualization:
Conclusion
The term "cloud computing" is mostly used to sell
hosted services in the sense of application service
provisioning that run client server software at a
remote location. Such services are given popular
acronyms like 'SaaS' (software as a service), 'PaaS'
(platform as a service), 'IaaS' (infrastructure as a
service), 'HaaS' (hardware as a service) and finally
'EaaS' (everything as a service). End users access
cloud-based applications through a web
browser, thin client or mobile app while
the business software and user's data are stored on
servers at a remote location. Examples include
Amazon web services and Google App engine
which allocate space for a user to deploy and
manage software "in the cloud".
Notion of Cloud is possible without Virtualization,
but it will be inefficient and inflexible.
Virtualization is an attempt to manage OS. There
are many levels and many ways to implement
Virtualization.
Acknowledgement:
I will like to thank our Prof. for giving the chance
to explore oneself.
References:
[1].http://www.slideshare.net/ConsonusTech/what-
is-virtualization-and-cloud-computing
[2].http://en.wikipedia.org/wiki/Cloud_computing
[3].http://www.cse.iitb.ac.in/convergence/worksho
ps/Intro_to_Virtualization.pdf
[4].http://www.virtualizationsoftwares.com/what-
is-paravirtualization/

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

About Cloud Computing
About Cloud ComputingAbout Cloud Computing
About Cloud Computing
 
Martin Huth presents Cloud Computing
Martin Huth presents Cloud ComputingMartin Huth presents Cloud Computing
Martin Huth presents Cloud Computing
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
Impactofcloudcomputing 141103103626-conversion-gate01
Impactofcloudcomputing 141103103626-conversion-gate01Impactofcloudcomputing 141103103626-conversion-gate01
Impactofcloudcomputing 141103103626-conversion-gate01
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
CloudBus
CloudBusCloudBus
CloudBus
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
Cloud Computing Technology_Usman
Cloud Computing Technology_UsmanCloud Computing Technology_Usman
Cloud Computing Technology_Usman
 
Billion Node Cloud
Billion Node CloudBillion Node Cloud
Billion Node Cloud
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
Cloud computing for enterprise
Cloud computing for enterpriseCloud computing for enterprise
Cloud computing for enterprise
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
Cloud computing Report
Cloud computing ReportCloud computing Report
Cloud computing Report
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud
CloudCloud
Cloud
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1
 
Cloud
CloudCloud
Cloud
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 

Destaque

Data Virtualization Primer - Introduction
Data Virtualization Primer - IntroductionData Virtualization Primer - Introduction
Data Virtualization Primer - IntroductionKenneth Peeples
 
Crash Course in Cloud Computing
Crash Course in Cloud ComputingCrash Course in Cloud Computing
Crash Course in Cloud ComputingAll Things Open
 
Cloud Computing & Big Data
Cloud Computing & Big DataCloud Computing & Big Data
Cloud Computing & Big DataMrinal Kumar
 
Big Data and Cloud Computing
Big Data and Cloud ComputingBig Data and Cloud Computing
Big Data and Cloud ComputingFarzad Nozarian
 
Cloud Computing and Big Data
Cloud Computing and Big DataCloud Computing and Big Data
Cloud Computing and Big DataZaloni
 
Big data on virtualized infrastucture
Big data on virtualized infrastuctureBig data on virtualized infrastucture
Big data on virtualized infrastuctureDataWorks Summit
 
Introduction to Cloud computing and Big Data-Hadoop
Introduction to Cloud computing and  Big Data-HadoopIntroduction to Cloud computing and  Big Data-Hadoop
Introduction to Cloud computing and Big Data-HadoopNagarjuna D.N
 
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...Abzetdin Adamov
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersAmazon Web Services
 
Overview of big data in cloud computing
Overview of big data in cloud computingOverview of big data in cloud computing
Overview of big data in cloud computingViet-Trung TRAN
 
The Power of your Data Achieved - Next Gen Modernization
The Power of your Data Achieved - Next Gen ModernizationThe Power of your Data Achieved - Next Gen Modernization
The Power of your Data Achieved - Next Gen ModernizationHortonworks
 
Big Data and Data Virtualization
Big Data and Data VirtualizationBig Data and Data Virtualization
Big Data and Data VirtualizationKenneth Peeples
 
Introduction to cloud computing and big data - part2
Introduction to cloud computing and big data - part2Introduction to cloud computing and big data - part2
Introduction to cloud computing and big data - part2Amir Payberah
 
IT Modernization Doesn’t Mean You Leave Your Legacy Apps Behind
IT Modernization Doesn’t Mean You Leave Your Legacy Apps BehindIT Modernization Doesn’t Mean You Leave Your Legacy Apps Behind
IT Modernization Doesn’t Mean You Leave Your Legacy Apps BehindApcera
 
Big Data
Big DataBig Data
Big DataNGDATA
 
Why Data Virtualization? An Introduction by Denodo
Why Data Virtualization? An Introduction by DenodoWhy Data Virtualization? An Introduction by Denodo
Why Data Virtualization? An Introduction by DenodoJusto Hidalgo
 
Cloud Computing and Big Data
Cloud Computing and Big DataCloud Computing and Big Data
Cloud Computing and Big DataRobert Keahey
 

Destaque (20)

Data Virtualization Primer - Introduction
Data Virtualization Primer - IntroductionData Virtualization Primer - Introduction
Data Virtualization Primer - Introduction
 
Crash Course in Cloud Computing
Crash Course in Cloud ComputingCrash Course in Cloud Computing
Crash Course in Cloud Computing
 
Cloud Computing & Big Data
Cloud Computing & Big DataCloud Computing & Big Data
Cloud Computing & Big Data
 
Big Data and Cloud Computing
Big Data and Cloud ComputingBig Data and Cloud Computing
Big Data and Cloud Computing
 
Cloud Computing and Big Data
Cloud Computing and Big DataCloud Computing and Big Data
Cloud Computing and Big Data
 
Big data on virtualized infrastucture
Big data on virtualized infrastuctureBig data on virtualized infrastucture
Big data on virtualized infrastucture
 
Introduction to Cloud computing and Big Data-Hadoop
Introduction to Cloud computing and  Big Data-HadoopIntroduction to Cloud computing and  Big Data-Hadoop
Introduction to Cloud computing and Big Data-Hadoop
 
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for Partners
 
Overview of big data in cloud computing
Overview of big data in cloud computingOverview of big data in cloud computing
Overview of big data in cloud computing
 
Big Data
Big DataBig Data
Big Data
 
The Power of your Data Achieved - Next Gen Modernization
The Power of your Data Achieved - Next Gen ModernizationThe Power of your Data Achieved - Next Gen Modernization
The Power of your Data Achieved - Next Gen Modernization
 
Big Data & The Cloud
Big Data & The CloudBig Data & The Cloud
Big Data & The Cloud
 
Big Data and Data Virtualization
Big Data and Data VirtualizationBig Data and Data Virtualization
Big Data and Data Virtualization
 
Introduction to cloud computing and big data - part2
Introduction to cloud computing and big data - part2Introduction to cloud computing and big data - part2
Introduction to cloud computing and big data - part2
 
IT Modernization Doesn’t Mean You Leave Your Legacy Apps Behind
IT Modernization Doesn’t Mean You Leave Your Legacy Apps BehindIT Modernization Doesn’t Mean You Leave Your Legacy Apps Behind
IT Modernization Doesn’t Mean You Leave Your Legacy Apps Behind
 
Big Data
Big DataBig Data
Big Data
 
Why Data Virtualization? An Introduction by Denodo
Why Data Virtualization? An Introduction by DenodoWhy Data Virtualization? An Introduction by Denodo
Why Data Virtualization? An Introduction by Denodo
 
Cloud Computing and Big Data
Cloud Computing and Big DataCloud Computing and Big Data
Cloud Computing and Big Data
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 

Semelhante a Cloud Computing And Virtualization

Cloud Compting History.
Cloud Compting History.Cloud Compting History.
Cloud Compting History.Allwyn24
 
History of Cloud Computing.pptx
History of Cloud Computing.pptxHistory of Cloud Computing.pptx
History of Cloud Computing.pptxvarshaJujare1
 
cloude computing report
cloude computing reportcloude computing report
cloude computing reportKrishnalal Kj
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationAhmed Abdisalan
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
Zpryme Report on Cloud and SAS Solutions
Zpryme Report on Cloud and SAS SolutionsZpryme Report on Cloud and SAS Solutions
Zpryme Report on Cloud and SAS SolutionsPaula Smith
 
Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computingSandhya Rathi
 
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITGovt. P.G. College Dharamshala
 
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTING
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTINGTU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTING
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTINGSujit Jha
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1Sagar Kumar
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeupselvavijay1987
 
Impacts of Cloud Computing in the Society
Impacts of Cloud Computing in the SocietyImpacts of Cloud Computing in the Society
Impacts of Cloud Computing in the Societytheijes
 
Cloud computing a boon for library services
Cloud computing a boon for library servicesCloud computing a boon for library services
Cloud computing a boon for library servicesKishor Satpathy
 
cloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfcloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfsuriyakalavinoth
 

Semelhante a Cloud Computing And Virtualization (20)

Cloud Compting History.
Cloud Compting History.Cloud Compting History.
Cloud Compting History.
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
History of Cloud Computing.pptx
History of Cloud Computing.pptxHistory of Cloud Computing.pptx
History of Cloud Computing.pptx
 
cloude computing report
cloude computing reportcloude computing report
cloude computing report
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Zpryme Report on Cloud and SAS Solutions
Zpryme Report on Cloud and SAS SolutionsZpryme Report on Cloud and SAS Solutions
Zpryme Report on Cloud and SAS Solutions
 
Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computing
 
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
 
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTING
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTINGTU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTING
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTING
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
Impacts of Cloud Computing in the Society
Impacts of Cloud Computing in the SocietyImpacts of Cloud Computing in the Society
Impacts of Cloud Computing in the Society
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing a boon for library services
Cloud computing a boon for library servicesCloud computing a boon for library services
Cloud computing a boon for library services
 
cloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfcloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdf
 
cc notes one.pdf
cc notes one.pdfcc notes one.pdf
cc notes one.pdf
 
Sami-Cloud
Sami-CloudSami-Cloud
Sami-Cloud
 
cloud computing
cloud computingcloud computing
cloud computing
 

Mais de Sonali Parab

Forensic laboratory setup requirements
Forensic laboratory setup requirementsForensic laboratory setup requirements
Forensic laboratory setup requirementsSonali Parab
 
Forensic laboratory setup requirements
Forensic laboratory setup  requirements Forensic laboratory setup  requirements
Forensic laboratory setup requirements Sonali Parab
 
Distributed systems
Distributed systemsDistributed systems
Distributed systemsSonali Parab
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseSonali Parab
 
Cloud and Ubiquitous Computing manual
Cloud and Ubiquitous Computing manual Cloud and Ubiquitous Computing manual
Cloud and Ubiquitous Computing manual Sonali Parab
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseSonali Parab
 
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksSonali Parab
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in BluetoothSonali Parab
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetoothSonali Parab
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud ProviderSonali Parab
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud ProviderSonali Parab
 
Remote Method Invocation
Remote Method InvocationRemote Method Invocation
Remote Method InvocationSonali Parab
 
Remote Method Invocation (Java RMI)
Remote Method Invocation (Java RMI)Remote Method Invocation (Java RMI)
Remote Method Invocation (Java RMI)Sonali Parab
 

Mais de Sonali Parab (19)

Forensic laboratory setup requirements
Forensic laboratory setup requirementsForensic laboratory setup requirements
Forensic laboratory setup requirements
 
Forensic laboratory setup requirements
Forensic laboratory setup  requirements Forensic laboratory setup  requirements
Forensic laboratory setup requirements
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Data Mining
Data MiningData Mining
Data Mining
 
Firewalls
FirewallsFirewalls
Firewalls
 
Embedded System
Embedded System Embedded System
Embedded System
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In Database
 
Cloud and Ubiquitous Computing manual
Cloud and Ubiquitous Computing manual Cloud and Ubiquitous Computing manual
Cloud and Ubiquitous Computing manual
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In Database
 
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
 
Minning www
Minning wwwMinning www
Minning www
 
Remote Method Invocation
Remote Method InvocationRemote Method Invocation
Remote Method Invocation
 
Agile testing
Agile testingAgile testing
Agile testing
 
Minning WWW
Minning WWWMinning WWW
Minning WWW
 
Remote Method Invocation (Java RMI)
Remote Method Invocation (Java RMI)Remote Method Invocation (Java RMI)
Remote Method Invocation (Java RMI)
 

Último

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Último (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Cloud Computing And Virtualization

  • 1. Abstract: Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. The cloud also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users. For example, a cloud computer facility that serves European users during European business hours with a specific application (e.g., email) may reallocate the same resources to serve North American users during North America's business hours with a different application (e.g., a web server). This approach should maximize the use of computing powers thus reducing environmental damage as well since less power, air conditioning, rackspace, etc. is required for a variety of functions. With cloud computing, multiple users can access a single server to retrieve and update their data without purchasing licenses for different applications. Keywords: Cloud computing, virtualization, SaaS, PaaS,IaaS, Types of cloud computing. I.INTRODUCTION In computer networking, cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers connected through a communication networksuch as the Internet. It is very similar to the concept of utility computing. In science, cloud computing is a synonym for distributed computing over a network, and means the ability to run a program or application on many connected computers at the same time. The phrase is often used in reference to network- based services, which appear to be provided by real server hardware, and are in fact served up by virtual hardware, simulated by software running on one or more real machines. Such virtual servers do not physically exist and can therefore be moved around and scaled up or down on the fly without affecting the end user, somewhat like a cloud becoming larger or smaller without being a physical object. In common usage, the term "the cloud" is essentially a metaphor for the Internet. Marketers have further popularized the phrase "in the cloud" to refer to software, platforms and infrastructure that are sold "as a service", i.e. remotely through the Internet. Typically, the seller has actual energy- consuming servers which host products and services from a remote location, so end-users don't have to; they can simply log on to the network without installing anything. The major models of cloud computing service are known as software as a service, platform as a service, andinfrastructure as a service. These cloud services may be offered in a public, private or hybrid network. Google, Amazon, OracleCloud, Salesforce, Zoho, Access2MyPC, and Microsoft Azure are some well-known cloud vendors II. History of Cloud Computing. a. The 1950s The underlying concept of cloud computing dates back to the 1950s, when large-scale mainframe computers became available in academia and corporations, accessible via thin clients/terminalcomputers, often referred to as "static terminals", because they were used for communications but had no internal processing capacities. To make more efficient use of costly mainframes, a practice evolved that allowed multiple users to share both the physical access to the computer from multiple terminals as well as to share the CPU time. This eliminated periods of inactivity on the mainframe and allowed for a greater return on the investment. The practice of sharing CPU time on a mainframe became known in the industry as time-sharing. During mid 70s it was popularly known as RJE Remote Job Entry process mostly associated with IBM and DEC. b. The 1960s–1990s John McCarthy opined in the 1960s that "computation may someday be organized as a public utility." Almost all of the modern-day characteristics of cloud computing (elastic provision, provided as a utility, online, illusion of infinite supply), the comparison to the electricity industry and the use of public, private, government, and community forms, were thoroughly explored inDouglas Parkhill's 1966 book, The Challenge of the Computer Utility. Other scholars have shown that cloud computing's roots go all the way back to Cloud Computing And Virtualization
  • 2. the 1950s when scientist Herb Grosch (the author of Grosch's law) postulated that the entire world would operate on dumb terminals powered by about 15 large data centers. Due to the expense of these powerful computers, many corporations and other entities could avail themselves of computing capability through time sharing and several organizations, such as GE's GEISCO, IBM subsidiary The Service Bureau Corporation (SBC, founded in 1957), Tymshare (founded in 1966), National CSS (founded in 1967 and bought by Dun & Bradstreet in 1979), Dial Data (bought by Tymshare in 1968), and Bolt, Beranek and Newman (BBN) marketed time sharing as a commercial venture. c. The 1990s In the 1990s, telecommunications companies, who previously offered primarily dedicated point-to- point data circuits, began offering virtual private network (VPN) services with comparable quality of service, but at a lower cost. By switching traffic as they saw fit to balance server use, they could use overall network bandwidth more effectively. They began to use the cloud symbol to denote the demarcation point between what the provider was responsible for and what users were responsible for. Cloud computing extends this boundary to cover servers as well as the network infrastructure. As computers became more prevalent, scientists and technologists explored ways to make large- scale computing power available to more users through time sharing, experimenting with algorithms to provide the optimal use of the infrastructure, platform and applications which prioritized the CPU and efficiency for the end users. d. Since 2000 After the dot-com bubble, Amazon played a key role in all the development of cloud computing by modernizing their data centers, which, like most computer networks, were using as little as 10% of their capacity at any one time, just to leave room for occasional spikes. Having found that the new cloud architecture resulted in significant internal efficiency improvements whereby small, fast-moving "two-pizza teams" (teams small enough to feed with two pizzas) could add new features faster and more easily, Amazon initiated a new product development effort to provide cloud computing to external customers, and launched Amazon Web Services (AWS) on a utility computing basis in 2006. In early 2008, Eucalyptus became the first open- source, AWS API-compatible platform for deploying private clouds. In early 2008, OpenNebula, enhanced in the RESERVOIR European Commission-funded project, became the first open-source software for deploying private and hybrid clouds, and for the federation of clouds. In the same year, efforts were focused on providingquality of service guarantees (as required by real-time interactive applications) to cloud- based infrastructures, in the framework of the IRMOS European Commission-funded project, resulting to a real-time cloud environment. By mid- 2008, Gartner saw an opportunity for cloud computing "to shape the relationship among consumers of IT services, those who use IT services and those who sell them" and observed that "organizations are switching from company- owned hardware and software assets to per-use service-based models" so that the "projected shift to computing ... will result in dramatic growth in IT products in some areas and significant reductions in other areas." On March 1, 2011, IBM announced the IBM SmartCloud framework to support Smarter Planet. Among the various components of the Smarter Computing foundation, cloud computing is a critical piece. On June 7, 2012, Oracle announced the Oracle Cloud. While aspects of the Oracle Cloud are still in development, this cloud offering is posed to be the first to provide users with access to an integrated set of IT solutions, including the Applications (SaaS), Platform (PaaS), and Infrastructure (IaaS) layers. III. Characteristics Cloud computing exhibits the following key characteristics: Agility improves with users' ability to re- provision technological infrastructure resources. Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way that a traditional user interface (e.g., a computer desktop) facilitates interaction between humans and computers. Cloud computing systems typically use Representational State Transfer (REST)-based APIs. Cost: cloud providers claim that computing costs reduce. A public-cloud delivery model converts capital expenditure to operational expenditure. This purportedly lowers barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive
  • 3. computing tasks. Pricing on a utility computing basis is fine-grained, with usage- based options and fewer IT skills are required for implementation (in-house). The e-FISCAL project's state-of-the-art repository contains several articles looking into cost aspects in more detail, most of them concluding that costs savings depend on the type of activities supported and the type of infrastructure available in-house. Device and location independenceenable users to access systems using a web browser regardless of their location or what device they use (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere. Virtualization technology allows sharing of servers and storage devices and increased utilization. Applications can be easily migrated from one physical server to another. Multitenancy enables sharing of resources and costs across a large pool of users thus allowing for: o centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.) o peak-load capacity increases (users need not engineer for highest possible load- levels) o utilisation and efficiency improvements for systems that are often only 10–20% utilised. Reliability improves with the use of multiple redundant sites, which makes well-designed cloud computing suitable for business continuity and disaster recovery. Scalability and elasticity via dynamic ("on- demand") provisioning of resources on a fine- grained, self-service basis near real- time[46] (Note, the VMstartup time varies by VM type, location, os and cloud providers), without users having to engineer for peak loads. Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface. Security can improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford to tackle. However, the complexity of security is greatly increased when data is distributed over a wider area or over a greater number of devices, as well as in multi-tenant systems shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security. Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places. The National Institute of Standards and Technology's definition of cloud computing identifies "five essential characteristics": On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Resource pooling. The provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear unlimited and can be appropriated in any quantity at any time. Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
  • 4. Fig 1: Uses of Internet for cloud computing IV. Service Models Cloud computing providers offer their services according to several fundamental models: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) where IaaS is the most basic and each higher model abstracts from the details of the lower models. Other key components in anything as a service (XaaS) are described in a comprehensive taxonomy model published in 2009, such as Strategy-as-a- Service, Collaboration-as-a-Service, Business Process-as-a-Service, Database-as-a-Service, etc. In 2012, network as a service (NaaS) and communication as a service (CaaS) were officially included by ITU (International Telecommunication Union) as part of the basic cloud computing models, recognized service categories of a telecommunication-centric cloud ecosystem. Fig 2: Service Models a. Infrastructure as a service (IaaS) In the most basic cloud-service model, providers of IaaS offer computers – physical or (more often) virtual machines – and other resources. (A hypervisor, such as Hyper- V or Xen or KVM or VMware ESX/ESXi, runs the virtual machines as guests. Pools of hypervisors within the cloud operational support-system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.) IaaS clouds often offer additional resources such as a virtual- machine disk image library, raw (block) and file- based storage, firewalls, load balancers, IP addresses, virtual local area networks(VLANs), and software bundles. IaaS-cloud providers supply these resources on-demand from their large pools installed in data centers. For wide- area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaSservices on a utility computing basiscost reflects the amount of resources allocated and consumed. Cloud communications and cloud telephony, rather than replacing local computing infrastructure, replace local telecommunications infrastructure with Voice over IP and other off-site Internet services. Fig 3: Infrastructure As A Service. b. Platform as a service (PaaS) In the PaaS models, cloud providers deliver a computing platform, typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PaaS offers like Windows Azure, the underlying
  • 5. computer and storage resources scale automatically to match application demand so that the cloud user does not have to allocate resources manually. The latter has also been proposed by an architecture aiming to facilitate real-time in cloud environments. Fig 4: Platform As A Service c. Software as a service (SaaS) In the business model using software as a service (SaaS), users are provided access to application software and databases. Cloud providers manage the infrastructure and platforms that run the applications. SaaS is sometimes referred to as "on- demand software" and is usually priced on a pay- per-use basis. SaaS providers generally price applications using a subscription fee. In the SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. Cloud users do not manage the cloud infrastructure and platform where the application runs. This eliminates the need to install and run the application on the cloud user's own computers, which simplifies maintenance and support. Cloud applications are different from other applications in their scalability—which can be achieved by cloning tasks onto multiple virtual machines at run-time to meet changing work demand. Load balancers distribute the work over the set of virtual machines. This process is transparent to the cloud user, who sees only a single access point. To accommodate a large number of cloud users, cloud applications can be multitenant, that is, any machine serves more than one cloud user organization. It is common to refer to special types of cloud-based application software with a similar naming convention: desktop as a service, business process as a service, test environment as a service, communication as a service. Fig 5: Software as a service V. Virtualization. ―Virtualization, in computing, is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system, a storage device or network resources‖ Concept is not new. Multi Programming – Each Process thinks it has complete control on all of the resources. Virtual Memory CPU Sharing VI. Virtualization Architecture OS assumes complete control of the underlying hardware. Virtualization architecture provides this illusion through a hypervisor/VMM. Hypervisor/VMM is a software layer which:Allows multiple Guest OS (Virtual Machines) to run simultaneously on a single physical host. Provides hardware abstraction to the running Guest OSs and efficiently multiplexes underlying hardware resources. Fig 6: Virtualization Architectur
  • 6. VII. Types Of Virtualization Different types of hardware virtualization include:  Full virtualization: Almost complete simulation of the actual hardware to allow software, which typically consists of a guest operating system, to run unmodified. In full virtualization, there is almost a complete model of the underlying physical system resources that allows any and all installed software to run without modification. Fig 7: Full virtualization  Partial virtualization: Some but not all of the target environment is simulated. Some guest programs, therefore, may need modifications to run in this virtual environment. In partial virtualization, not everything in the target environment becomes simulated. Not all software programs installed on the guest operating system can run unmodified.  Paravirtualization: A hardware environment is not simulated; however, the guest programs are executed in their own isolated domains, as if they are running on a separate system. Guest programs need to be specifically modified to run in this environment. With paravirtualization, any and all software that is running on a virtual system will be able to work directly on the underlying physical system hardware. That is, the software itself on the virtual machine's guest operating system will be able to make calls on the hardware directly instead of relying on just the virtual machine to make the necessary calls for it. Because of this, performance is increased without the need to sacrifice any computing power. Fig 8:Paravirtualization: Conclusion The term "cloud computing" is mostly used to sell hosted services in the sense of application service provisioning that run client server software at a remote location. Such services are given popular acronyms like 'SaaS' (software as a service), 'PaaS' (platform as a service), 'IaaS' (infrastructure as a service), 'HaaS' (hardware as a service) and finally 'EaaS' (everything as a service). End users access cloud-based applications through a web browser, thin client or mobile app while the business software and user's data are stored on servers at a remote location. Examples include Amazon web services and Google App engine which allocate space for a user to deploy and manage software "in the cloud". Notion of Cloud is possible without Virtualization, but it will be inefficient and inflexible. Virtualization is an attempt to manage OS. There are many levels and many ways to implement Virtualization. Acknowledgement: I will like to thank our Prof. for giving the chance to explore oneself. References: [1].http://www.slideshare.net/ConsonusTech/what- is-virtualization-and-cloud-computing [2].http://en.wikipedia.org/wiki/Cloud_computing [3].http://www.cse.iitb.ac.in/convergence/worksho ps/Intro_to_Virtualization.pdf [4].http://www.virtualizationsoftwares.com/what- is-paravirtualization/