Monday, April 15, 2019
Cloud Computing Essay Example for Free
swarm Computing Essay* Integrated development environment as a make pass (IDEaaS) In the business model using software system as a do, utilizers are provided overture to industry software and databases. The smirch providers manage the foundation and syllabuss on which the applications draw and quarter. SaaS is sometimes referred to as on-demand software and is usually priced on a pay-per- affair understructure. SaaS providers generally price applications using a subscription fee. Proponents claim that the SaaS allows a business the potential to trim back IT operational make ups by outsourcing hardware and software maintenance and support to the slander provider. This enables the business to reapportion IT operations costs away from hardware/software spending and personnel expenses, towards meeting other IT goals. In addition, with applications hosted centrally, updates lowlife be released without the motivation for substance ab exploiters to install new softwar e. One drawback of SaaS is that the users data are stored on the obliterate providers innkeeper.As a response, there could be unauthorized access to the data. End users access mottle-based applications through a meshwork browser or a light-weight desktop or mobile app spell the business software and users data are stored on servers at a remote location. Proponents claim that demoralize compute allows enterprises to get their applications up and running faster, with improved manage talent and less maintenance, and enables IT to more(prenominal) rapidly coif imagings to meet fluctuating and unpredictable business demand.23 taint reckon relies on sharing of resources to achieve cohesiveness and economies of scale similar to a utility (like the electricity grid) over a interlocking.4 This article may block off original research. Please improve it by verifying the claims made and adding references. Statements consisting only of original research may be removed. (January 2013) The origin of the term bedim calculate is obscure, but it appears to derive from the practice of using drawings of conventionalized bedims to denote networks in diagrams of computing and communications systems. The word pervert is used as a parable for the Internet, based on the standardized use of a cloud-like shape to denote a network on telephony schematics and later to depict the Internet in computer network diagrams as an abstraction of the central infrastructure it represents. The cloud symbol was used to represent the Internet as early as 1994.56 The underlying concept of cloud computing dates back to the 1950s, when freehanded-scale mainframe became available in academia and corporations, convenient via thin leaf nodes / terminalcomputers. Because it was costly to buy a mainframe, it became important to find shipway to get the greatest return on the investment in them, allowing dual users to share both the physical access to the computer from multiple termi nals as well as to share the CPU time, eliminating periods of inactivity, which became known in the industry as time-sharing.7In the 1990s, telecommunications companies, who previously offered primarily dedicated point-to-point data circuits, began offering practical(prenominal) common soldier network (VPN) dos with similar quality of service but at a much lower cost. By switching dealing to balance consumption as they saw fit, they were able to utilize their overall network bandwidth more effectively. The cloud symbol was used to denote the demarcation point between that which was the responsibility of the provider and that which was the responsibility of the users. Cloud computing extends this boundary to cover servers as well as the network infrastructure.8 As computers became more prevalent, scientists and technologists explored ways to make large-scale computing power available to more users through time sharing, experimenting with algorithms to provide the optimum use of the infrastructure, platform and applications with prioritized access to the CPU and efficiency for the end users.9 John McCarthy opined in the 1960s that reckoning may someday be organized as a public utility.Al near all the modern characteristics of cloud computing (elastic provision, provided as a utility, online, illusion of infinite supply), the comparison to the electricity industry and the use of public, private, government, and community forms, were thoroughly explored in Douglas Parkhills 1966 book, The Challenge of the Computer Utility. Other scholars have shown that cloud computings roots go all the way back to the 1950s when scientist Herb Grosch (the author of Groschs law) postulated that the entire world would operate on dumb terminals powered by about 15 large data centers.10 Due to the expense of these correctly computers, many corporations and other entities could avail themselves of computing capability through time sharing and several organizations, such(pren ominal)(prenominal) as GEs GEISCO, IBM subsidiary The Service Bureau Corporation (SBC, makeed in 1957), Tymshare (founded in 1966), National CSS (founded in 1967 and bought by Dun Bradstreet in 1979), Dial Data (bought by Tymshare in 1968), and Bolt, Beranek and Newman (BBN) marketed time sharing as a commercial venture. The development of the Internet from cosmos document centric via semantic data towards more and more services was described as Dynamic Web.11This contribution focused in fractionicular in the impoverishment for better meta-data able to describe not only implementation details but also abstract details of model-based applications. The ubiquitous availability of high-capacity networks, low-cost computers and storage devices as well as the widespread word sense of hardware virtualization, service-oriented architecture,autonomic, and utility computing have led to a tremendous growth in cloud computing.121314 After the dot-com bubble, Amazon functioned a key role in the development of cloud computing by modernizing their data centers, which, like most computer networks, were using as little as 10% of their capacity at any one time, just to leave room for occasional spikes. Having found that the new cloud architecture resulted in significant internal efficiency improvements whereby small, fast-moving two-pizza teams (teams small enough to be fed with two pizzas) could add new features faster and more easily, Amazon initiated a new harvest-tide development effort to provide cloud computing to external customers, and launched Amazon Web Service (AWS) on a utility computing tail end in 2006.1516 In early 2008, Eucalyptus became the first open-source, AWS API-compatible platform for deploying private clouds.In early 2008, OpenNebula, enhanced in the RESERVOIR European Commission-funded project, became the first open-source software for deploying private and hybrid clouds, and for the federation of clouds.17 In the same year, efforts were focuse d on providing quality of service guarantees (as necessitate by real-time interactive applications) to cloud-based infrastructures, in the framework of the IRMOS European Commission-funded project, resulting to a real-time cloud environment.18By mid-2008, Gartner saw an opportunity for cloud computing to shape the relationship among consumers of IT services, those who use IT services and those who sell them19 and find that organizations are switching from company-owned hardware and software assets to per-use service-based models so that the projected shift to computing forget result in dramatic growth in IT products in some areas and significant reductions in other areas.20 On March 1, 2011, IBM announced the Smarter Computing framework to support Smarter Planet.21 Among the various components of the Smarter Computing foundation, cloud computing is a critical piece. edit Similar systems and conceptsCloud computing shares characteristics with* Autonomic computing Computer systems capable of self-management.22 * Clientserver model Clientserver computing refers broadly to any distributed application that distinguishes between service providers (servers) and service requesters (clients).23 * Grid computing A form of distributed and parallel computing, whereby a super and virtual computer is tranquil of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks. * Mainframe computer Powerful computers used mainly by large organizations for critical applications, typically mickle data processing such as census, industry and consumer statistics, police and secret intelligence services, enterprise resource planning, and financial transaction processing.24* Utility computing The packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity.2526 * Peer-to-peer Distributed architecture without the need for central coordination, with parti cipants being at the same time both suppliers and consumers of resources (in contrast to the traditional clientserver model). * Cloud gaming Also known as on-demand gaming, this is a way of delivering games to computers. The gaming data will be stored in the providers server, so that gaming will be independent of client computers used to play the game. edit CharacteristicsCloud computing exhibits the following key characteristics* Agility improves with users ability to re-provision technological infrastructure resources. * Application programme interface (API) accessibility to software that enables machines to interact with cloud software in the same way the user interface facilitates interaction between humans and computers. Cloud computing systems typically use REST-based APIs. * Cost is claimed to be reduced and in a public cloud delivery model capital expenditure is reborn to operational expenditure.27 This is purported to lower barriers to entry, as infrastructure is typical ly provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained with rule-based options and fewer IT skills are required for implementation (in-house).28 The e-FISCAL projects state of the art repository29 contains several articles looking into cost aspects in more detail, most of them concluding that costs savings depend on the type of activities support and the type of infrastructure available in-house.* Device and location independence30 enable users to access systems using a vane browser regardless of their location or what device they are using (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.28 * Virtualization technology allows servers and storage devices to be shared and utilization be change magnitude. Applications can be easily migrated from one physical serve r to another. * Multitenancy enables sharing of resources and costs crosswise a large pool of users thus allowing for * Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.) * Peak-load capacity increases (users need not engineer for highest possible load-levels) * Utilisation and efficiency improvements for systems that are a good deal only 1020% utilised.15 * Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery.31 * Scalability and elasticity via dynamic (on-demand) provisioning of resources on a fine-grained, self-service basis near real-time,32 without users having to engineer for peak loads.3334* Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.28 * shelter could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels.35 Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford.36 However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users rely to retain control over the infrastructure and avoid losing control of information security.* Maintenance of cloud computing applications is easier, because they do not need to be installed on each users computer and can be accessed from dissimilar places. The National Institute of Standards and Technologys definition of cloud compu ting identifies five essential characteristics On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed mechanically without requiring human interaction with each service provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Resource pooling.The providers computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be approp riated in any quantity at any time. Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. National Institute of Standards and Technology4On-demand self-service work through also Self-service provisioning for cloud computing services and Service catalogs for cloud computing services On-demand self-service allows users to obtain, configure and deploy cloud services themselves using cloud service catalogues, without requiring the assistance of IT.3738 This feature is listed by the National Institute of Standards and Technology (NIST) as a characteristic of cloud computing.4 The self-service requirement of cloud computing prompts infrastructure vendors to cre ate cloud computing templates, which are obtained from cloud service catalogues. Manufacturers of such templates or blueprints include Hewlett-Packard (HP), which names its templates as HP Cloud Maps39 RightScale40 and Red Hat, which names its templates CloudForms.41 The templates contain predefined configurations used by consumers to set up cloud services. The templates or blueprints provide the expert information necessary to build ready-to-use clouds.40 distributively template includes specific configuration details for different cloud infrastructures, with information about servers for specific tasks such as hosting applications, databases, websites and so on.40 The templates also include predefined Web service, the operating system, the database, security configurations and load balancing.41 Cloud consumers use cloud templates to move applications between clouds through a self-service portal. The predefined blueprints define all that an application requires to run in different environments. For example, a template could define how the same application could be deployed in cloud platforms based on Amazon Web Service, VMware or Red Hat.42 The user organization benefits from cloud templates because the technical aspects of cloud configurations reside in the templates, letting users to deploy cloud services with a push of a button.4344 Cloud templates can also be used by developers to create a catalog of cloud services.45 edit Service modelsCloud computing providers offer their services according to three fundamental models446 infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) where IaaS is the most basic and each higher model abstracts from the details of the lower models. In 2012 network as a service (NaaS) and communication as a service (CaaS) were officially included by ITU (International telecom Union) as part of the basic cloud computing models, recognized service categories of a telecommunication-centri c cloud ecosystem.47 nucleotide as a service (IaaS)See also CategoryCloud infrastructureIn the most basic cloud-service model, providers of IaaS offer computers physical or (more often) virtual machines and other resources. (A hypervisor, such as Xen or KVM, runs the virtual machines as guests.) Pools of hypervisors within the cloud operational support-system can support large numbers of virtual machines and the ability to scale services up and down according to customers varying requirements. IaaS clouds often offer additional resources such as images in a virtual-machine image-library, raw (block) and file-based storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.48 IaaS-cloud providers supply these resources on-demand from their large pools installed indata centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks).To deploy their applications, cloud us ers install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis cost reflects the amount of resources allocated and consumed. Examples of IaaS providers include Amazon CloudFormation, Amazon EC2, Windows Azure Virtual Machines, DynDNS, Google Compute Engine, HP Cloud, iland, Joyent,Rackspace Cloud, ReadySpace Cloud Services, and Terremark. edit Platform as a service (PaaS)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.