0% found this document useful (0 votes)
81 views22 pages

Cloud Computing Group Presentations

The document provides an overview of cloud computing including definitions, characteristics, categories, security issues, and use cases. It defines cloud computing, explains the 5 major characteristics, discusses the 4 categories of cloud and data redundancy, outlines common security issues and strategies to address them, and gives examples of how companies use cloud computing.

Uploaded by

ruemutamiri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views22 pages

Cloud Computing Group Presentations

The document provides an overview of cloud computing including definitions, characteristics, categories, security issues, and use cases. It defines cloud computing, explains the 5 major characteristics, discusses the 4 categories of cloud and data redundancy, outlines common security issues and strategies to address them, and gives examples of how companies use cloud computing.

Uploaded by

ruemutamiri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Group 1 Presentation

Our Presentation focused on providing an introduction to Cloud computing and further


explaining the 5 major characteristics of cloud computing.

What is Cloud Computing?


Cloud computing can be explained as a computing technology that uses the internet and
central remote servers to maintain its data and application. Applications and services that run
on a distributed network using virtualized resources accessed by common Internet protocols
and networking standards make use of cloud computing.

Companies use cloud computing to fulfill the needs of their customers, partners, and providers.
Cloud computing includes vendors, partners, and business leaders as the three major
contributors. The vendors are the ones who provide applications and their related technology,
infrastructure, hardware, and integration.

Characteristics of Cloud Computing

There are 5 major Characteristics of Cloud computing;


1. On-demand self-service
2. Broad network access
3. Resource pooling
4. Rapid elasticity
5. Measured Service

On-demand self-service
IT is used as service and is readily available on demand without requiring manual
intervention
Broad network access
Needs to be accessed across the internet from a broad range of devices such as PCs,
laptops, and mobile devices, using standards-based APIs (for example, ones based on
HTTP). Deployments of services in the cloud include everything from using business
applications to the latest application on the newest smartphones

Resource pooling
The provider makes the necessary resources available to multiple consumers using
technologies such as virtualization and multi tenancy.

Rapid elasticity
The resources necessary can be provisioned rapidly and released without manual
intervention when no longer needed.

Measured Service
Uses metering for managing and optimizing the service and to provide reporting and
billing information. In this way, consumers are billed for services according to how
much they have actually used during the billing period. (A service consumed must be
measurable in terms of the resources used. In this way, consumption-based billing
becomes possible. Also known as “pay as you go” or “pay-per-use.”)
GROUP 2

Categories of the Cloud and Data Redundancy

There 4 Categories of the cloud namely:

● Private

Hosting all your computing infrastructure yourself and is not shared.


● Public

Whole computing infrastructure is located on the premises of a cloud computing


company that offers the cloud service.

● Community

A community cloud is shared between organizations with a common goal or that


fit into a specific community (professional community, geographic community)

● Hybrid

This model incorporates the best of both private and public clouds, but each can
remain as separate entities

Redundancy and cloud computing

Redundancy in cloud architecture ensures that any individual failure has a fallback
within the architecture. That means in the event of a disturbance to IT operations,
business can continue as normal.

5 Levels of Redundancy
1. Hardware

Several servers with backups to enable 100% uptime. Hardware redundancy is


achieved by providing two or more physical copies of a hardware component.

2. Processing

Occurs when one reloads a process.

3. Network

Process through which additional or alternate instances of network devices,


equipment and communication mediums are installed within the network structure
4. Geographic

Geo redundancy will replicate your data and store this backup data in a separate
physical location just in case one site fails

5. Storage

Data redundancy is a condition created within a database or data storage

technology in which the same piece of data is held in two separate places.

GROUP 3

GROUP 4
Questions
Cloud security issues on: Service provider,Client,On the Network
Mitigatory strategies with regards to cloud computing
Regulatory compliance on the cloud and load balancing.

Cloud Security can be viewed as a shared responsibility between cloud providers and
their customers.Most cloud computing security risks are related to cloud data
security.These include lack of visibility to data, inability to control data, or theft of
data in the cloud. Most issues come back to the data customers put in the cloud.

It is every organization’s responsibility to understand what data they put in the


cloud, who can access it, and what level of protection they (and the cloud provider)
have applied.

Cloud security issues:


On-Demand Self Service Simplifies Unauthorized Use.

Lack of visibility into what data is within cloud applications

Theft of data from a cloud application by malicious actor

Incomplete control over who can access sensitive data


Lack of staff with the skills to manage security for cloud applications

Inability to prevent malicious insider theft or misuse of data

Advanced threats and attacks against the cloud application provider (phishing
attacks, ddos attacks etc)

Insecure interfaces and APIs

Inability to maintain regulatory compliance

Mitigatory strategies with regards to cloud computing.

Do your due diligence.


Two-Factor Authentication (2FA) or Single Sign-on (SSO).

Work with a third party to assure cloud security on a regular basis.

End to end encryption.

Secure data transfers.

Local data backups.

Regular update your in house software.

Cloud load balancing


It refers to distributing client requests across multiple application servers that are
running in a cloud environment. Like other forms of load balancing, cloud load
balancing enables you to maximize application performance and reliability; its
advantages over traditional load balancing of on‑premises resources are the (usually)
lower cost and the ease of scaling the application up or down to match demand.

Cloud compliance
Cloud Compliance is about complying with the laws and regulations that apply to
using the cloud. Most organizations are moving to the cloud because there are good
business reasons to do so. The law does not prevent the adoption of cloud. It does,
however, have a significant impact. When moving to the cloud it is important to
know in which countries your data will be processed, what laws will apply, what
impact they will have, and then follow a risk-based approach to comply with them. It
can be hard because there are many different kinds of laws, like data protection
laws, data localization laws and data sovereignty laws. You also need to consider
interception laws or access to information laws, which may enable Governments or
others to access your data in the cloud. In addition, the laws of many different
countries might apply. It is also important to know what security measures the law
requires you to put in place.

GROUP 5

Introduction
Companies are adopting cloud computing as both primary and secondary sets of
on-demand computers. Some cloud computing use cases are pretty traditional (e.g.,
a simple web presence) while others become extremely complex and complete
edge-cases .

Examples of Cloud Use Cases


Website Hosting – While companies can host their web presences on physical servers
or single cloud servers, the true scale and ability to grow comes when these business
start enabling transactions or other web-based services within their hosted
environments. If they are built in the cloud, they are prepared to scale and grow
based on demand.

File Storage, Synchronization & Sharing – There are common services like Dropbox,
Mega and Google Drive. These are file storage and synchronization services. Some
provide limited storage while others are limitless. They scale and they are
on-demand and accessible via the Internet.
Advertising – Advertising frequently is headless, that is to say, ads are dispersed yet
centrally managed behind the scenes by a “mother ship.” Advertising Central Servers
are often coupled with Content Delivery Network – CDN – services). Used in
conjunction with Big Data, advertising companies have become more agile by using
the cloud as their primary computer and storage resource.
Web, Social and Mobile – There is a new social service or aggregator of social
content or mechanism to nurture communities being announced every week. And
more often than not, these environments and services are being stood up in the
cloud. There is a convergence of web and mobile, meaning companies should always
think about their mobile presence as more and more consumers use smartphones to
access sites and services, the cloud offers a perfect platform for these multi-access
environments.
Business Intelligence/Big Data –Businesses are turning towards analytics, Business
Intelligence and Big Data to find out more about their prospects and their customers.
As the data grows, so must the environment that captures and analyzes it. Since the
cloud is scalable, it’s a perfect partner for Big Data, analytics and BI. Often, the
cloud is used as the presentation layer for the results of analysis
Email – This is the classic SaaS application which has been around for years. From
Gmail to Outlook.com , consumers and businesses access this service via the Internet
as well.
Disaster Recovery – Setting up environments within the cloud has become much
easier. Third parties are enabling redundancy and failover services as cloud
computing matures. As opposed to traditional physical infrastructures which sit idle
waiting to be “called into action,” cloud disaster recovery or failover environments
can stand by as environments in “saved” states in the form of machine images, or
they can be as hot standbys, meaning they contain live replicated files and data.
Test and Development – The flexibility of the cloud allows for environments to be
built up, tested and torn down quickly. There is no need to wait months for the
provisioning of a new environment, the cloud can be spun up in a matter of minutes.
The accessibility of the cloud means that your business is more efficient, and time to
market for new developments can be cut down.
Seasonal Capacity – Cloud allows the set up of a multi-tiered environment that has
elasticity in the front-end (e.g., the web and application servers) while putting your
larger database servers in a protected back-end. When you need capacity to meet
the demands of your end users, you scale out that web/application server layer and
when the need subsides, you scale it back. That way, you don’t leave any
infrastructure under-utilized (that can get expensive).
Big Data Analysis

Cloud Computing can store a tremendous amount of data which can also help
big data. Big Data, a large amount of data (structured or unstructured) is
analyzed for further analysis or for decision making in the business.
AWS is a comprehensive, easy to use computing platform offered by Amazon. The
platform is developed with a combination of infrastructure as a service (IaaS),
platform as a service (PaaS) and packaged software as a service (SaaS) offerings

History of AWS
2002- AWS services launched
2006- Launched its cloud products
2012- Holds first customer event
2015- Reveals revenues achieved of $4.6 billion
2016- Surpassed $10 billon revenue target
2019- Offers nearly 100 cloud services
In simple words AWS allows you to do the following things:
1. Running web and application servers in the cloud to host dynamic websites.
2. Securely store all your files on the cloud so you can access them from anywhere.
3. Using managed databases like MySQL, PostgreSQL, Oracle or SQL Server to store
information.
4. Deliver static and dynamic files quickly around the world using a

Basic Terminologies
Region — A region is a geographical area. Each region consists of 2 (or more)
availability zones.
Availability Zone — It is simply a data center.
Edge Location — They are CDN (Content Delivery Network) endpoints for CloudFront.

Compute
EC2 (Elastic Compute Cloud) — These are just the virtual machines in the cloud on
which you have the OS level control. You can run whatever you want in them.
ECS (Elastic Container Service) — It is a highly scalable container service to allows
you to run Docker containers in the cloud.
EKS (Elastic Container Service for Kubernetes) — Allows you to use Kubernetes on
AWS without installing and managing your own Kubernetes control plane. It is a
relatively new service.
Lambda — AWS’s serverless technology that allows you to run functions in the cloud.
It’s a huge cost saver as you pay only when your functions execute.

Storage
S3 (Simple Storage Service) — Storage service of AWS in which we can store objects
like files, folders, images, documents, songs, etc. It cannot be used to install
software, games or Operating System.

Databases
RDS (Relational Database Service) — Allows you to run relational databases like
MySQL, MariaDB, PostgreSQL, Oracle or SQL Server. These databases are fully
managed by AWS like installing antivirus and patches.

Artificial Intelligence
Lex — Allows you to quickly build chatbots.
Polly — AWS’s text-to-speech service. You can create audio versions of your notes
using it.
Machine learning — You just have to give your dataset and target variable and AWS
will take care of training your model.
Rekognition — AWS’s face recognition service. Allows you to recognize faces and
object in images and videos.
SageMaker — Helps you to build, train and deploy machine learning models at any
scale.
Comprehend — It is a Natural Language Processing (NLP) service that uses machine
learning to find insights and relationships in text. It can be used for sentiment
analysis.
Transcribe — It is the opposite of Polly. It is AWS’s speech-to-text service that
provides that provides high-quality and affordable transcriptions.
Translate — It is like Google Translate and allows you to translate text in one
language to another.

Advantages of AWS
Following are the pros of using AWS services:
AWS allows organizations to use the already familiar programming models, operating
systems, databases, and architectures.
It is a cost-effective service that allows you to pay only for what you use, without
any up-front or long-term commitments.
You will not require to spend money on running and maintaining data centers.
Offers fast deployments
You can easily add or remove capacity
You are allowed cloud access quickly with limitless capacity.
Total Cost of Ownership is very low compared to any private/dedicated servers.
Allows you to deploy your application in multiple regions around the world with just
a few clicks

Disadvantages of AWS
If you need more immediate or intensive assistance, you'll have to opt for paid
support packages.
Amazon Web Services may have some common cloud computing issues when you
move to a cloud. For example, downtime, limited control, and backup protection.
AWS sets default limits on resources which differ from region to region. These
resources consist of images, volumes, and snapshots.
Hardware-level changes happen to your application which may not offer the best
performance and usage of your applications.

Best practices of AWS


You need to design for failure, but nothing will fail.
It's important to decouple all your components before using AWS services.
You need to keep dynamic data closer to compute and static data closer to the user.
It's important to know security and performance tradeoffs.
Pay for computing capacity by the hourly payment method.
Make a habit of a one-time payment for each instance you want to reserve and to
receive a significant discount on the hourly charge.

Microsoft Azure
At its core, Azure is a public cloud computing platform—with solutions including
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a
Service (SaaS) that can be used for services such as analytics, virtual computing,
storage, networking, and much more. It can be used to replace or supplement your
on-premise servers.
Virtual machines
Create Microsoft or Linux virtual machines (VMs) in just minutes from a wide
selection of marketplace templates or from your own custom machine images. These
cloud-based VMs will host your apps and services as if they resided in your own data
center.
SQL databases
Azure offers managed SQL relational databases, from one to an unlimited number, as
a service.This saves you overhead and expenses on hardware, software, and the need
for in-house expertise.

Azure Active Directory Domain services


Built on the same proven technology as Windows Active Directory, this service for
Azure lets you remotely manage group policy, authentication, and everything else.
This makes moving and existing security structure partially or totally to the cloud as
easy as a few clicks.
Application services
With Azure it’s easier than ever to create and globally deploy applications that are
compatible on all popular web and portable platforms. Reliable, scalable cloud
access lets you respond quickly to your business’s ebb and flow, saving time and
money. With the introduction of Azure WebApps to the Azure Marketplace, it’s easier
than ever to manage production, testing and deployment of web applications that
scale as quickly as your business. Prebuilt APIs for popular cloud services like Office
365, Salesforce and more greatly accelerate development.

Visual Studio team services


An add-on service available under Azure, Visual Studio team services offer a
complete application lifecycle management (ALM) solution in the Microsoft cloud.
Developers can share and track code changes, perform load testing, and deliver
applications to production while collaborating in Azure from all over the world.
Visual Studio team services simplify development and delivery for large companies or
new ones building a service portfolio.

Storage
Count on Microsoft’s global infrastructure to provide safe, highly accessible data
storage. With massive scalability and an intelligent pricing structure that lets you
store infrequently accessed data at a huge savings, building a safe and cost-effective
storage plan is simple in Microsoft Azure.

Advantages of Microsoft Azure

1. Microsoft Azure offers high availability - Azure, you’ll find that the uptime
guarantee you’re given is 99.95%. In real-time hours, that means you can expect
about 4.5 hours of downtime over the course of an entire year

2. It offers you a strong security profile- Azure follows the DADSC approach to
security: detect, assess, diagnose, stabilize, and close.

3. Azure offers good scalability options - Just click on the upgrades that you need,
then remove them when you’ve gotten the work done. This structure makes it easier
to pay only for what you use

4. It is a cost-effective solution for an IT budget - Because you’re using a cloud


provider, you don’t have the same capital investments into IT infrastructure that
other businesses face. For the SMB, that means being able to become instantly
competitive on a global stage with their technology. You only purchase what you
need, when you need it.

5. There are multiple redundancies in place to maintain data access - Microsoft Azure
has access to a wide range of global data centers that will help you be able to access
your data. That is how they can assure continuous availability at higher levels than
their competition

6. Azure allows you to use any framework, language, or tool - hen you have Microsoft
Azure working for you, then you can turn your ideas into solutions very quickly. All
you need to do is bring your code to start doing what you already love. Azure allows
you to build apps with the language you prefer, including .NET, Java, and Node.js,
then gives you access to tools like Visual Studio. This allows you to stay productive
while focusing on the coding instead of how it is managed

Disadvantages of Microsoft Azure


You’ll need to manage Azure to make it effect - microsoft Azure does not help you
manage your cloud-based data center. That means you’ll need to have boots on the
ground that know how to use Azure, which includes server monitoring and patching.

You must have platform expertise available - If you’re moving from on-premise
servers to the cloud, you may find that your computing power does not move along
with you. To generate the same levels of computing power on this cloud-based
platform, you may find that the costs are several thousand dollars more per year
than what you’re currently paying

Azure almost forces you to put all your eggs into one basket - What Microsoft Azure
proposes for your business is a single vendor strategy. Although working with one
vendor does increase convenience, it also increases your risk.
GROUP 6
Question: A practical demonstration of a network setup using packet tracer.
Virtualization explained.

Overview of the network diagram

This is a diagrammatic presentation of the network setup. A network is generally


defined as a connection between two or more computers for the purpose of
communicating data electronically.
Network Device basics:

1. Router:

A router is a device that forwards data packets along networks. A router is connected to
at least two networks, commonly two LANs or WANs or a LAN and its ISP's network.
Routers are located at gateways, the places where two or more networks connect.

2. Switch:

A network switch is a hardware device that channels incoming data from multiple input
ports to a specific output port that will take it toward its intended destination. It is a small
device that transfers data packets between multiple network devices such as
computers, routers, servers or other switches.

In a local area network (LAN) using Ethernet, a network switch determines where to
send each incoming message frame by looking at the physical device address (also
known as the Media Access Control address or MAC address). Switches maintain
tables that match each MAC address to the port which the MAC address is received. A
network switch operates on the network layer, called layer 2 of the OSI model.

3. Ethernet Cables: An Ethernet cable is a common type of network cable used with
wired networks. Ethernet cables connect devices such as PCs, routers, and switches
within a local area network. These physical cables are limited by length and durability.

There are two types of ethernet cables being:

Straight Through Cable

A straight through cable is a type of twisted pair cable that is used in local area

networks to connect a computer to a network hub such as a router. This type of cable is

also sometimes called a patch cable and is an alternative to wireless connections

where one or more computers access a router through a wireless signal. On a straight

through cable, the wired pins match. Straight through cable use one wiring standard:
both ends use T568A wiring standard or both ends use T568B wiring standard. The

following figure shows a straight through cable of which both ends are wired as the

T568B standard.

Crossover Cable

A crossover Ethernet cable is a type of Ethernet cable used to connect computing

devices together directly. Unlike straight through cable, the RJ45 crossover cable uses

two different wiring standards: one end uses the T568A wiring standard, and the other

end uses the T568B wiring standard. The internal wiring of Ethernet crossover cables

reverses the transmit and receive signals. It is most often used to connect two devices

of the same type: e.g. two computers (via network interface controller) or two switches

to each other.
Cisco Packet Tracer demonstration

For purposes of more clarity to the class, a practical network simulation and
configuration demonstration was carried out using the Cisco Packet Tool. Two
networks were designed and ports configured as follows.

Network 1 : 10.10.10.0/24

Network 2: 10.10.20.0/24

After the setup ping tests were carried out to show that packets were being routed
within networks and between the two networks. The following screenshot shows the
test results.
Virtualization

Virtualization is the creation of virtual servers, infrastructures, devices and computing


resources. Virtualization changes the hardware-software relations and is one of the
foundational elements of cloud computing technology that helps utilize cloud computing
capabilities to the full. Unlike virtualization, cloud computing refers to the service that results
from that change. It describes the delivery of shared computing resources, SaaS and
on-demand services through the Internet.

A technology called the Virtual Machine Monitor or virtual manager, encapsulates the basics of
virtualization in cloud computing. It is used to separate the physical hardware from its emulated
parts. This often includes the CPU’s memory, I/O and network traffic.
The layer of software that enables this abstraction is called “hypervisor”. It is “a software layer
that can monitor and virtualize the resources of a host machine conferring to the user
requirements.” The most common hypervisor is referred to as Type 1. By talking to the
hardware directly, it virtualizes the hardware platform that makes it available to be used by
virtual machines. The second one is called a Type 2 hypervisor, which requires an operating
system.

Full Virtualization
Para Virtualization (PV)
PV is an efficient and lightweight virtualization technique introduced by the Xen Project team.
PV does not require virtualization extensions from the host CPU. However, PV guests and
control domains require kernel support.
In PV, the hardware environment is not emulated; however, the guest programs are executed in
their own isolated domains.

Types of Virtualization in Cloud Computing


There are six types of virtualization techniques in cloud computing:

Network Virtualization
Network virtualization in cloud computing is a method of combining the available resources in a
network by splitting up the available bandwidth into different channels, each being separate
and distinguished. They can be either assigned to a particular server or device or stay
unassigned completely all in real time.

Storage Virtualization
Using this technique gives the user an ability to pool the hardware storage space from several
interconnected storage devices into a simulated single storage device that is managed from
one single command console. This storage technique is often used in storage area networks.
Storage manipulation in the cloud is mostly used for backup, archiving, and recovering of data
by hiding the real and physical complex storage architecture. Administrators can implement it
with software applications or by employing hardware and software hybrid appliances.

Server Virtualization
This technique is the masking of server resources. It simulates physical servers by changing
their identity, numbers, processors and operating systems. This spares the user from
continuously managing complex server resources. It also makes a lot of resources available for
sharing and utilizing, while maintaining the capacity to expand them when needed.

Data Virtualization
This kind of cloud computing virtualization technique is abstracting the technical details usually
used in data management, such as location, performance or format, in favour of broader
access and more resiliency that are directly related to business needs.

Desktop Virtualization
This model enables you to emulate a workstation load, rather than a server. This allows the
user to access the desktop remotely. Since the workstation is essentially running in a data
center server, access to it can be both more secure and portable.

Application Virtualization
Software virtualization in cloud computing abstracts the application layer, separating it from the
operating system. This way the application can run in an encapsulated form without being
dependent upon the operating system underneath. In addition to providing a level of isolation,
an application created for one OS can run on a completely different operating system.

You might also like