Report Cloud Computing
Report Cloud Computing
Report Cloud Computing
Submitted By:
Sanesh Sivan
1.INTRODUCTION
Cyber infrastructure
Today, almost any business or major activity uses, or relies in some form, on
IT and IT services. These services need to be enabling and appliance-like,
and there must be an economy of- scale for the total-cost-of-ownership to be
better than it would be without cyber infrastructure. Technology needs to
improve end-user productivity and reduce Technology-driven overhead
Service-Oriented Architecture
SOA is not a new concept, although it again has been receiving considerable
attention in recent years [e.g., Bel08, IBM08a]. Examples of some of the first
network-based service-oriented architectures are remote procedure calls
(RPC), DCOM and Object Request Brokers (ORBs) based on the CORBA
specifications . A more recent example are so called “Grid Computing
architectures and solutions . In an SOA environment end-users request an
IT service (or an integrated collection of such services) at the desired
functional, quality and capacity level, and receive the response at the time
requested or at a specified later time. Service discovery, brokering, and
reliability are important .Goal of the SOA is that creating an architecture in
which services are able to communicate using http protocol It is expected
that in the next 10 years, service-based solutions will be a major vehicle for
delivery of information and other IT assisted functions at both individual and
organizational levels.
Cloud Architecture
Cloud –Types
Public cloud:
Public cloud or external cloud describes cloud computing in the traditional
mainstream. Public clouds are run by third parties, and applications from
different customers are likely to be mixed together on the cloud’s servers,
storage systems, and networks. A public cloud provides services to multiple
customers.
Hybrid cloud:
Hybrid clouds combine both public and private cloud models. This is most
often seen with the use of storage clouds to support Web 2.0 applications.
Private cloud:
Private clouds are built for the exclusive use of one client, providing the
utmost control over data, security, and quality of service (Figure 4). The
company owns the infrastructure and has control over how applications are
deployed on it. Private clouds can be built and managed by a company’s own
IT organization or by a cloud provider.
They are
Users
The most important Cloud entity, and the principal quality driver and
constraining influence is, of course, the user. The value of a solutions
depends very much on the view it has of its end-user requirements and user
categories.
Cloud Computing system can be divided it into two sections: the front end
and the back end. They connect to each other through a network, usually the
Internet. Thefront end is the side the computer user, or client, sees.The back
end is the "cloud" section of the system. On the back end there are various
computers,servers and data storage systems that create the "cloud" of
computing services.A central server administers the system, monitoring
traffic and client demands to ensure everything runs smoothly. It followsa set
of rules called protocols Servers and remote computers do most of the work
and store the data.
Cloud Computing in the Real World
1. Time Machine
Times machine is a New York Times project in which one can read any issue
from volume 1, Number 1 of The New York Daily Times, on September 18,
1851 through to The New York Times of December 30, 1922. They made it
such that one can choose a date in history and flip electronically through the
pages, displayed with their original look and feel. Here’s what they did. They
scanned all their public domain articles from 1851 to 1992 into TIFF files.
They converted it into PDF files and put them online. Using 100 Linux
computers, the job took about 24 hours. Then a coding error was discovered
that required the job be rerun. That’s when their software team decided that
the job of maintaining this much data was too much to do in-house. So they
made use of cloud computing services to do the work. All the content was
put in the cloud, in Amazon. They made use of 100 instances of Amazon EC2
and completed the whole work in less than 24 hours. They uploaded all the
TIFF files into the cloud and made a program in Hadoop which does the
whole job. Using Amazon.com's EC2 computing platform, the Times ran a
PDF conversion app that converted that 4TB of TIFF data into 1.5TB of PDF
files. The PDF files were such that they were fully searchable. The image
manipulation and the search ability of the software were done using cloud
computing services.
3. SmugMug
6.4. Nasdaq
NASDAQ which had lots of stock and fund data wanted to make extra
revenue selling historic data for those stocks and funds. But for this offering,
called Market Replay, the company didn't want to worry about optimizing its
databases and servers to handle the new load. So it turned to Amazon's S3
service to host the data, and created a lightweight reader app that let users
pull in the required data. The traditional approach wouldn't have gotten off
the ground economically. NASDAQ took its market data and created flat files
for every entity, each holding enough data for a 10-minute replay of the
stock's or fund's price changes, on a second-by-second basis. It adds
100,000 files per day to the several million it started with.
Merits:
Cloud enabler technologies like utility computing, Grid Computing, RTI, web
infrastructure and others are cloud enabled.
6. The Cloud makes it possible to launch Web 2.0 applications quickly and to
scale up applications as much as needed when needed.
Demerits:
Stored data might not be secure: With cloud computing, all our data is
stored on the cloud. The unauthorized users gain access to our confidential
data. Dependent on internet connection:Internet connectivity isn’t
completely stable and reliable. It’s not platform agnostic:Most clouds force
participants to rely on a single platform or host only one type of product. Can
be slow:Even on a fast connection,web based application scan
sometimes be slower than accessing a similar software program on our
desktop PC