SlideShare uma empresa Scribd logo
1 de 22
WHAT IS ?
 Cloud computing is a type of computing that relies on sharing computing
resources rather than having local servers or personal devices to handle
applications.
 Describes a variety of different computing concepts that involve a large number
of computers that are connected through a real-time communication network
(typically the Internet).
 At the foundation of cloud computing is the broader concept of converged
infrastructure and shared services.
 Cloud computing is comparable to grid computing, a type of computing where
unused processing cycles of all computers in a network are harnesses to solve
problems too intensive for any stand-alone machine.
CLOUD SUMMARY
 Cloud computing is an umbrella term used to refer to Internet based
development and services
 A number of characteristics define cloud data, applications services
and infrastructure:
 Remotely hosted: Services or data are hosted on remote
infrastructure.
 Ubiquitous: Services or data are available from anywhere.
 Commodified: The result is a utility computing model similar to
traditional that of traditional utilities, like gas and electricity - you
pay for what you would want!
Cloud Computing Characteristics
Common Characteristics:
Low Cost Software
Virtualization Service Orientation
Advanced Security
Homogeneity
Massive Scale Resilient Computing
Geographic Distribution
Essential Characteristics:
Resource Pooling
Broad Network Access Rapid Elasticity
Measured Service
On Demand Self-Service
Cloud Computing Architecture
 There are two sections: the front end and the back end. They connect to each
other through a network, usually the Internet.
 The front end includes the client's computer (or computer network) and the
application required to access the cloud computing system.
 On the back end of the system are the various computers, servers and data
storage systems that create the "cloud" of computing services.
 A cloud computing system can include any computer program. Its based on a
technique called server virtualization. Usually, each application will have its
own dedicated server.
 A central server administers the system, monitoring traffic and client demands
to ensure everything runs smoothly.
CLOUD ARCHITECTURE
Cloud Computing Architecture
 A central server follows a set of rules called protocols and uses a special kind
of software called middleware.
 Middleware allows networked computers to communicate with each other.
 A Cloud Computing System follows Data Redundancy which enables the
central server to access backup machines to retrieve data.
 Server Virtualisation : It's possible to fool a physical server into thinking it's
actually multiple servers, each running with its own independent operating
system. The technique is called server virtualization.
 By maximizing the output of individual servers, server virtualization reduces
the need for more physical machines.
Hardware
Operating System
App App App
Traditional Stack
Hardware
OS
App App App
Hypervisor
OS OS
Virtualized Stack
Virtual Machines
 VM technology allows multiple virtual machines to
run on a single physical machine.
Hardware
Virtual Machine Monitor (VMM) / Hypervisor
Guest OS
(Linux)
Guest OS
(NetBSD)
Guest OS
(Windows)
VM VM VM
AppApp AppAppApp
Xen
VMWare
UML
Denali
etc.
Performance: Para-virtualization (e.g. Xen) is very close to raw physical performance!
Utility computing
 Examples: Amazon’s EC2, GoGrid, AppNexus
Platform as a Service (PaaS)
 Example: Google App Engine
Software as a Service (SaaS)
 Example: Gmail
Application Service
(SaaS)
Application Platform
Server Platform
Storage Platform Amazon S3, Dell, Apple, ...
3Tera, EC2, SliceHost,
GoGrid, RightScale, Linode
Google App Engine, Mosso,
Force.com, Engine Yard,
Facebook, Heroku, AWS
MS Live/ExchangeLabs, IBM,
Google Apps; Salesforce.com
Quicken Online, Zoho, Cisco
HOW CLOUD COMPUTING WORKS?
 To accomplish its goals, cloud computing uses networks of large groups
of servers typically running low-cost consumer PC technology with
specialized connections to spread data-processing chores across them.
 This shared IT infrastructure contains large pools of systems that are
linked together.
 Often, virtualization techniques are used to maximize the power of
cloud computing.
CLOUD COMPUTING LOGICAL DIAGRAM
BASIC CLOUD CHARACTERISTICS
1. The “no-need-to-know” in terms of the underlying details of
infrastructure, applications interface with the infrastructure via the
APIs.
1. The “flexibility and elasticity” allows these systems to scale up and
down at will
1. utilising the resources of all kinds
2. CPU, storage, server capacity, load balancing, and databases
2. The “pay as much as used and needed” type of utility computing
and the “always on!, anywhere and any place” type of network-
based computing.
BASIC CLOUD CHARACTERISTICS
 Cloud are transparent to users and applications, they can be built in
multiple ways
 branded products, proprietary open source, hardware or software,
or just off-the-shelf PCs.
 In general, they are built on clusters of PC servers and off-the-shelf
components plus Open Source software combined with in-house
applications and/or system software
Cloud Storage
 Several large Web companies are now exploiting
the fact that they have data storage capacity that
can be hired out to others.
 allows data stored remotely to be temporarily cached on
desktop computers, mobile phones or other Internet-
linked devices.
 Amazon’s Elastic Compute Cloud (EC2) and
Simple Storage Solution (S3) are well known
examples
 Mechanical Turk
APPLICATIONS OF CLOUD COMPUTING
 They could access the cloud computing system using any computer linked to
the Internet. Data wouldn't be confined to a hard drive or any internal
network.
 It could bring hardware costs down. Cloud computing systems would reduce
the need for advanced hardware on the client side.
 Cloud computing gives these companies the option of storing data on someone
else's hardware, removing the need for physical space on the front end.
 If the cloud computing system's back end is a grid computing system, then the
client could take advantage of the entire network's processing power.
 Corporations might save money on IT support. Streamlined hardware would,
in theory, have fewer problems than a network of heterogeneous machines
and operating systems
GOALS OF CLOUD COMPUTING
 To apply traditional supercomputing, or high-performance computing
power normally used by military and research facilities.
 To perform tens of trillions of computations per second, in consumer-
oriented applications such as financial portfolios.
 To deliver personalized information.
 To provide data storage or to power large, immersive computer games.
Cloud Computing Concerns
 Security : Corporate executives might hesitate to take advantage of a
cloud computing system because they can't keep their company's
information under lock and key. The counterargument to this position
is that the companies offering cloud computing services live and die by
their reputations. It benefits these companies to have reliable security
measures in place.
 Privacy : Cloud computing companies will need to find ways to
protect client privacy. One way is to use authentication techniques
such as user names and passwords. Another is to employ an
authorization format -- each user can access only the data and
applications relevant to his or her job.
ADVANTAGES OF CLOUD COMPUTING
 Used in marketing to sell hosted services in the sense of application service
provisioning that run client server software on a remote location.
 It allows users the mobility necessary in this day and age of global marketing.
 Versatile Compatibility : Users are often surprised to find that the various
cloud apps available are accessible on both platforms.
 Cloud allows users to literally get what they pay for. This scalability allows for
you to simply purchase the applications and data storage you really need.
 Individuality : One of the most convenient aspects of working in the cloud is
that it is compatible with aspects specific to the company. For example, cloud IT
services can be scaled to meet changing system demands within a single
company.
DISADVANTAGE OF CLOUD COMPUTING
 Less Control : Utilising the public cloud in business does have an obvious
downside. By using this technology you risk losing a level of control over
your company.
 Not Always Enough Room : Many have been disappointed with cloud
technology, because they find that once they have instituted a cloud
system within their business, they run out of storage space.
 Security and Confidentiality : Cloud computing does pose the risk of
increased security threats. While most companies have an up-to-date virus
database, this does not make the files and information stored in the cloud
immune to hackers.
The Future...
 Many of the activities loosely grouped together under cloud computing
have already been happening and centralised computing activity is not
a new phenomena.
 Grid Computing was the last research-led centralised approach.
 However there are concerns that the mainstream adoption of cloud
computing could cause many problems for users.
 Many new open source systems appearing that you can install and run
on your local cluster
 should be able to run a variety of applications on these systems.

Mais conteúdo relacionado

Mais procurados

Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Akhila Param
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing pptBhuvneshYadav13
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Clouding computing
Clouding computingClouding computing
Clouding computingMadhavi39
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4kongara
 
Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09dhanya.sumeru
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Cloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data EuropeCloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data EuropeDavid Martin
 
Introduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityIntroduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityOran Epelbaum
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A ReviewAjay844
 
Cloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingCloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingRavi Kumar
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
 

Mais procurados (20)

Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Clouding computing
Clouding computingClouding computing
Clouding computing
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09Elements Of Cloud Computing Satish Jun24 09
Elements Of Cloud Computing Satish Jun24 09
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Mis cloud computing
Mis cloud computingMis cloud computing
Mis cloud computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data EuropeCloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data Europe
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Introduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityIntroduction to Cloud Computing and Security
Introduction to Cloud Computing and Security
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Cloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingCloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional Computing
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 

Semelhante a Cloud computing

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introductionguest90f660
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud ComputingLiming Liu
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaPrashant Gupta
 
Cloud computing
Cloud computingCloud computing
Cloud computingwaghu
 
cloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfcloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfSANDY4772
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptPravesh ARYA
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptAmex Ka
 
Cloud computing and Advantages
Cloud computing and AdvantagesCloud computing and Advantages
Cloud computing and AdvantagesToneshkumar Pardhi
 

Semelhante a Cloud computing (20)

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
cloude computing
cloude computingcloude computing
cloude computing
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant upta
 
Cloud Computing Neccesity
Cloud Computing  NeccesityCloud Computing  Neccesity
Cloud Computing Neccesity
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Cloud Computing ppt
 
cloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfcloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdf
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cc.doc
cc.doccc.doc
cc.doc
 
Cloud computing and Advantages
Cloud computing and AdvantagesCloud computing and Advantages
Cloud computing and Advantages
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Cloud computing

  • 1.
  • 2. WHAT IS ?  Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.  Describes a variety of different computing concepts that involve a large number of computers that are connected through a real-time communication network (typically the Internet).  At the foundation of cloud computing is the broader concept of converged infrastructure and shared services.  Cloud computing is comparable to grid computing, a type of computing where unused processing cycles of all computers in a network are harnesses to solve problems too intensive for any stand-alone machine.
  • 3. CLOUD SUMMARY  Cloud computing is an umbrella term used to refer to Internet based development and services  A number of characteristics define cloud data, applications services and infrastructure:  Remotely hosted: Services or data are hosted on remote infrastructure.  Ubiquitous: Services or data are available from anywhere.  Commodified: The result is a utility computing model similar to traditional that of traditional utilities, like gas and electricity - you pay for what you would want!
  • 4. Cloud Computing Characteristics Common Characteristics: Low Cost Software Virtualization Service Orientation Advanced Security Homogeneity Massive Scale Resilient Computing Geographic Distribution Essential Characteristics: Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service
  • 5. Cloud Computing Architecture  There are two sections: the front end and the back end. They connect to each other through a network, usually the Internet.  The front end includes the client's computer (or computer network) and the application required to access the cloud computing system.  On the back end of the system are the various computers, servers and data storage systems that create the "cloud" of computing services.  A cloud computing system can include any computer program. Its based on a technique called server virtualization. Usually, each application will have its own dedicated server.  A central server administers the system, monitoring traffic and client demands to ensure everything runs smoothly.
  • 7. Cloud Computing Architecture  A central server follows a set of rules called protocols and uses a special kind of software called middleware.  Middleware allows networked computers to communicate with each other.  A Cloud Computing System follows Data Redundancy which enables the central server to access backup machines to retrieve data.  Server Virtualisation : It's possible to fool a physical server into thinking it's actually multiple servers, each running with its own independent operating system. The technique is called server virtualization.  By maximizing the output of individual servers, server virtualization reduces the need for more physical machines.
  • 8. Hardware Operating System App App App Traditional Stack Hardware OS App App App Hypervisor OS OS Virtualized Stack
  • 9. Virtual Machines  VM technology allows multiple virtual machines to run on a single physical machine. Hardware Virtual Machine Monitor (VMM) / Hypervisor Guest OS (Linux) Guest OS (NetBSD) Guest OS (Windows) VM VM VM AppApp AppAppApp Xen VMWare UML Denali etc. Performance: Para-virtualization (e.g. Xen) is very close to raw physical performance!
  • 10. Utility computing  Examples: Amazon’s EC2, GoGrid, AppNexus Platform as a Service (PaaS)  Example: Google App Engine Software as a Service (SaaS)  Example: Gmail
  • 11. Application Service (SaaS) Application Platform Server Platform Storage Platform Amazon S3, Dell, Apple, ... 3Tera, EC2, SliceHost, GoGrid, RightScale, Linode Google App Engine, Mosso, Force.com, Engine Yard, Facebook, Heroku, AWS MS Live/ExchangeLabs, IBM, Google Apps; Salesforce.com Quicken Online, Zoho, Cisco
  • 12. HOW CLOUD COMPUTING WORKS?  To accomplish its goals, cloud computing uses networks of large groups of servers typically running low-cost consumer PC technology with specialized connections to spread data-processing chores across them.  This shared IT infrastructure contains large pools of systems that are linked together.  Often, virtualization techniques are used to maximize the power of cloud computing.
  • 14. BASIC CLOUD CHARACTERISTICS 1. The “no-need-to-know” in terms of the underlying details of infrastructure, applications interface with the infrastructure via the APIs. 1. The “flexibility and elasticity” allows these systems to scale up and down at will 1. utilising the resources of all kinds 2. CPU, storage, server capacity, load balancing, and databases 2. The “pay as much as used and needed” type of utility computing and the “always on!, anywhere and any place” type of network- based computing.
  • 15. BASIC CLOUD CHARACTERISTICS  Cloud are transparent to users and applications, they can be built in multiple ways  branded products, proprietary open source, hardware or software, or just off-the-shelf PCs.  In general, they are built on clusters of PC servers and off-the-shelf components plus Open Source software combined with in-house applications and/or system software
  • 16. Cloud Storage  Several large Web companies are now exploiting the fact that they have data storage capacity that can be hired out to others.  allows data stored remotely to be temporarily cached on desktop computers, mobile phones or other Internet- linked devices.  Amazon’s Elastic Compute Cloud (EC2) and Simple Storage Solution (S3) are well known examples  Mechanical Turk
  • 17. APPLICATIONS OF CLOUD COMPUTING  They could access the cloud computing system using any computer linked to the Internet. Data wouldn't be confined to a hard drive or any internal network.  It could bring hardware costs down. Cloud computing systems would reduce the need for advanced hardware on the client side.  Cloud computing gives these companies the option of storing data on someone else's hardware, removing the need for physical space on the front end.  If the cloud computing system's back end is a grid computing system, then the client could take advantage of the entire network's processing power.  Corporations might save money on IT support. Streamlined hardware would, in theory, have fewer problems than a network of heterogeneous machines and operating systems
  • 18. GOALS OF CLOUD COMPUTING  To apply traditional supercomputing, or high-performance computing power normally used by military and research facilities.  To perform tens of trillions of computations per second, in consumer- oriented applications such as financial portfolios.  To deliver personalized information.  To provide data storage or to power large, immersive computer games.
  • 19. Cloud Computing Concerns  Security : Corporate executives might hesitate to take advantage of a cloud computing system because they can't keep their company's information under lock and key. The counterargument to this position is that the companies offering cloud computing services live and die by their reputations. It benefits these companies to have reliable security measures in place.  Privacy : Cloud computing companies will need to find ways to protect client privacy. One way is to use authentication techniques such as user names and passwords. Another is to employ an authorization format -- each user can access only the data and applications relevant to his or her job.
  • 20. ADVANTAGES OF CLOUD COMPUTING  Used in marketing to sell hosted services in the sense of application service provisioning that run client server software on a remote location.  It allows users the mobility necessary in this day and age of global marketing.  Versatile Compatibility : Users are often surprised to find that the various cloud apps available are accessible on both platforms.  Cloud allows users to literally get what they pay for. This scalability allows for you to simply purchase the applications and data storage you really need.  Individuality : One of the most convenient aspects of working in the cloud is that it is compatible with aspects specific to the company. For example, cloud IT services can be scaled to meet changing system demands within a single company.
  • 21. DISADVANTAGE OF CLOUD COMPUTING  Less Control : Utilising the public cloud in business does have an obvious downside. By using this technology you risk losing a level of control over your company.  Not Always Enough Room : Many have been disappointed with cloud technology, because they find that once they have instituted a cloud system within their business, they run out of storage space.  Security and Confidentiality : Cloud computing does pose the risk of increased security threats. While most companies have an up-to-date virus database, this does not make the files and information stored in the cloud immune to hackers.
  • 22. The Future...  Many of the activities loosely grouped together under cloud computing have already been happening and centralised computing activity is not a new phenomena.  Grid Computing was the last research-led centralised approach.  However there are concerns that the mainstream adoption of cloud computing could cause many problems for users.  Many new open source systems appearing that you can install and run on your local cluster  should be able to run a variety of applications on these systems.