Scc
Scc
Deployment Model
1.Public Cloud: Services over the internet, managed by a provider (e.g.,
AWS, Azure).
Pros: Low cost, scalable, no maintenance.
Cons: Less secure, limited customization.
2.Private Cloud: Exclusive to one organization (e.g., VMware Cloud).
Pros: High control, security, customizable.
Cons: Expensive, less scalable.
3.Hybrid Cloud: Mix of public and private (e.g., AWS + internal data center).
Pros: Flexible, cost-efficient, secure.
Cons: Complex to manage, potential latency.
4.Community Cloud: Shared by similar organizations (e.g., healthcare
networks).
Pros: Cost-effective, secure, collaborative.
Cons: Limited scalability, less customization.
5.Multi-Cloud: Uses multiple providers (e.g., AWS + Azure).
Pros: Diverse features, reliable, reduced latency.
Cons: Complex, potential security risks.
Service Model
1.Infrastructure as a Service (IaaS)
Description: Rents virtualized infrastructure like servers and storage.
Features: Flexible, scalable, pay-as-you-go.
Examples: AWS, Azure, GCP.
2.Platform as a Service (PaaS)
Description: Offers a platform for app development and deployment.
Features: Built-in tools, app runtime management, integrated services.
Examples: Google App Engine, Heroku, Azure App Service.
3.Software as a Service (SaaS)
Description: Delivers ready-to-use software over the internet.
Features: Accessible online, maintenance-free, subscription-based.
Examples: Salesforce, Office 365, Google Workspace.
4.Identity as a Service (IDaaS)
Description: Cloud-based identity and authentication management.
Features: Authentication, SSO, user role management.
Examples: Okta, Azure Active Directory, OneLogin.
5.Network as a Service (NaaS)
Description: Virtualized network services for scalable connectivity.
Features: Network management, scalability, cost efficiency.
Examples: Cisco Meraki, Amazon VPC, Google Cloud VPC.
Communication protocol
1. Gossip Protocol: A decentralized method for spreading updates by
having nodes periodically communicate with a random subset of peers.
Usage: Fault tolerance and consistency in distributed systems.
2. Connectionless Protocol: A protocol where data packets are sent without
establishing a connection or ensuring delivery. Example: UDP.
Usage: Applications needing fast data transfer with acceptable data loss,
like streaming.
3. Secure Remote Password (SRP): An authentication protocol that secures
password exchanges without transmitting passwords over the network.
Usage: Secure user authentication.
4. Internet Group Management Protocol (IGMP): Manages multicast group
memberships in IP networks.
Usage: Multicast applications like streaming media.
5. Session Initiation Protocol (SIP): A protocol for managing real-time
communication sessions, such as voice and video calls.
Usage: VoIP and video conferencing.
6. Common Event Expression Protocol (CEEP): Standardizes the format
and transmission of event notifications.
Usage: Event-driven systems.
7. Extensible Messaging and Presence Protocol (XMPP): An open standard
for real-time messaging and presence information.
Usage: Instant messaging and real-time collaboration.
8. Advanced Message Queuing Protocol (AMQP): A protocol for secure and
reliable message queuing.
Usage: Enterprise messaging and communication between distributed servi
9. Enhanced Interior Gateway Routing Protocol (EIGRP): A Cisco routing
protocol using distance vector and link-state features.
Usage: Routing within large networks.
10. Message Transfer Protocol (MTP): A protocol for message transfer in
telecommunication networks.
Usage: Call setup and SMS delivery in telecommunication.
Advantagesof cc
1.Cost Savings: Pay-as-you-go model reduces upfront hardware costs.
2.Scalability: Easily adjust resources based on demand.
3.Accessibility: Access applications and data from anywhere.
4.Automatic Updates: Providers handle maintenance and updates.
5.Disaster Recovery: Built-in backup and recovery solutions.
6.Security: Advanced security features and compliance options.
7.Innovation: Access to a wide range of tools and services.
Disadvantages
1.Security Concerns: Potential risks to data security and privacy.
2.Downtime: Service outages can affect availability.
3.Limited Control: Less control over infrastructure and customization.
4.Cost Management: Unexpected charges can occur.
5.Compliance Issues: Complexity in meeting regulatory requirements.
6.Latency: Potential delays in performance.
7.Vendor Lock-In: Difficulty in switching providers.
standards:
-Platform virtualization of resources (Open Source Virtualization is the
process of developing virtual versions of operating systems, hardware
platforms, storage devices, or computer network resources. )
- Service-oriented architecture (defines a way to make software
components reusable and interoperable via service interfaces.)
- Web-application frameworks (open standards are XML, SQL and HTML.)
- Standardized Web services (Web services are built on top of open
standards such as TCP/IP, HTTP, Java, HTML, and XML.)
- Autonomic systems (self-managed systems in both physical and software
form) server load balancing, process allocation, memory error-correction.
- Grid computing ( a group of networked computers that work together as a
virtual supercomputer to perform large tasks- [OGSA- open grid service
architecture])
Cloud Infrastructure
-Most large Infrastructure as a Service (IaaS) providers rely on virtual
machine technology to deliver servers that can run applications.
-Virtual servers described in terms of a machine image or instance have
characteristics that often can be described in terms of real servers
delivering a certain number of microprocessor (CPU) cycles, memory
access, and network bandwidth to customers.
-Virtual machines are containers that are assigned specific resources. The
software that runs in the virtual machines is what defines the utility of the
cloud computing system.
Load Balancing
Definition:Load balancing distributes workloads across multiple resources
(e.g., servers, VMs) to optimize performance, availability, and scalability.
Levels of Load Balancing
1.Network Load Balancing: Distributes network traffic across multiple
servers. -Layer: Network layer.
2.Application Load Balancing: Distributes application requests across
multiple instances. -Layer: Application layer.
3.Database Load Balancing: Distributes database queries across multiple
servers. -Layer: Database layer.
Advantages
-Improved Performance: Reduces strain on individual resources.
-High Availability: Minimizes service disruptions.
-Scalability: Easily scales to manage demand fluctuations.
-Efficient Resource Utilization: Optimizes resource use and reduces costs.
Disadvantages
-Complexity: Can be difficult to implement, especially for large systems.
-Cost: May incur extra costs for specialized hardware/software.
-Single Point of Failure: Improper management may cause failures at the
load balancer.
-Security Risks: Incorrect configurations can expose vulnerabilities
Key Components:
-Host Machine: The physical machine running virtual environments.
-Guest Machine: The virtual machine operating on the host.
-Impact: Allows cloud providers to share infrastructure, reducing costs and
-improving efficiency. Supports IaaS and provides virtual environments for
applications, storage, and networking.
Benefits
-Efficient Resource Use: Better allocation and reduced costs.
-Enhanced Productivity: Speeds up development.
-Scalability: Easy to scale resources and access remotely.
-High Availability: Supports disaster recovery.
Drawbacks
-High Initial Cost: Significant setup investment.
-Learning Curve: Requires skilled staff or training.
-Security Risks: Potential data vulnerabilities with third-party hosting.
Characteristics
-Security: Provides a controlled environment.
-Managed Execution: Allows sharing and isolation of resources.
Types
-Application Virtualization: Runs apps separately from the OS.
-Network Virtualization: Abstracts network resources.
-Desktop Virtualization: Offers virtual desktops remotely.
-Storage Virtualization: Pools storage from multiple devices.
-Server Virtualization: Splits a server into multiple virtual servers.
-Data Virtualization: Integrates data from various sources into a single view.
IDaas interoperability:
Identity as a Service (IDaaS) interoperability allows organizations to
integrate identity services into applications with minimal development effort.
IDaaS is a cloud-based service model that provides identity and access
management (IAM) services to organizations. It helps organizations
manage user authentication and authorization for their cloud applications
and services.
IDaaS interoperability includes services such as:
-User centric authentication: Usually in the form of information cards,
supported by OpenID and CardSpace specifications
-XACML(Extensible Access Control Markup Language policy language)
: Is an attribute based access control policy language or XML based
language designed to express security policies and access requests to
information.
-APIs: Assist in interoperability with other security software tools.