SlideShare a Scribd company logo
Cloud Computing
Introduction
BY PROF. TRUPTI SISODE
What is Cloud Computing?
 It is the use of remote servers on the internet to store, manage and process data rather than
local servers.
 It includes on-demand access to resources like storage, processing power, and
applications. Users can scale resources dynamically, pay for what they use, and access
services from various devices.
 People use cloud computing in various aspects of their daily lives, often without even
realizing it.
 For example;
1. File Storage: Store and access documents, photos, and videos on cloud storage services
like Google Drive or Dropbox.
2. Email: Use cloud-based email services such as Gmail or Outlook for seamless access to
emails and attachments from different devices.
Cloud Computing real life examples:
1. Social Media: Share updates, photos, and videos on platforms like Facebook and Instagram, which leverage
cloud infrastructure.
2. Streaming Content: Enjoy movies, music, and TV shows through cloud-based streaming services like Netflix
and Spotify.
3. Productivity Tools: Collaborate on documents and spreadsheets in real-time using cloud-based productivity
suites like Google Docs, Microsoft Word, and Excel online. This allows users to create, edit, and collaborate
on documents in real-time from different locations.
4. Backup and Sync: Automatically back up and synchronize data, including photos and contacts, using cloud
services like Google Photos.
5. Mobile Apps: Access apps and games on different devices, with cloud storage preserving settings and
progress.
6. Online Shopping: Shop securely on e-commerce platforms like Amazon, benefiting from cloud infrastructure
for seamless transactions.
7. Navigation: Utilize cloud-powered GPS services like Google Maps for real-time navigation and traffic
updates.
Architecture of Cloud Computing
Architecture of Cloud Computing
The architecture of cloud computing encompasses both frontend and backend
components. The frontend is what users interact with directly, while the backend is the
underlying infrastructure and services that support the frontend.
Frontend Architecture:
1. Client Infrastructure:
1. The UI is the part of the application that users interact with.
2. It can be a web-based interface, mobile app, or any other form of user interaction.
Backend Architecture:
 Cloud Service Provider:
Infrastructure provided by cloud service providers (e.g., AWS, Azure, Google Cloud) that
host and manage the backend infrastructure.
Architecture of Cloud Computing
 Runtime Cloud-
Runtime cloud in backend provides the execution and Runtime platform/environment to the Virtual machine.
 Storage –
Storage in backend provides flexible and scalable storage service and management of stored data.
 Infrastructure –
Cloud Infrastructure in backend refers to the hardware and software components of cloud like it includes
servers, storage, network devices, virtualization software etc.
 Management –
Management in backend refers to management of backend components like application, service, runtime
cloud, storage, infrastructure, and other security mechanisms etc.
 Security –
Security in backend refers to implementation of different security mechanisms in the backend for secure
cloud resources, systems, files, and infrastructure to end-users.
 Application –
Application in backend refers to a software or platform to which client accesses. Means it provides the
service in backend as per the client requirement.
Advantages of cloud computing
1.
Cost Efficiency: Cloud computing eliminates the need for upfront capital investment in hardware and
allows businesses to pay for resources based on actual usage, optimizing costs.
2.
Scalability: Cloud services provide the flexibility to scale computing resources up or down, ensuring
that organizations can adapt to changing workloads and demands efficiently.
3.Reliability and High Availability: Cloud providers offer redundant and geographically distributed
infrastructure, reducing the risk of downtime and ensuring continuous availability of services.
4.Security: Reputable cloud providers implement robust security measures, including encryption,
identity management, and compliance certifications, enhancing data protection and privacy.
5.Automatic Updates and Maintenance: Cloud providers handle system updates and maintenance
tasks, ensuring that businesses always have access to the latest features and security patches without
manual intervention.
6.Resource Utilization: Cloud services optimize resource usage by allowing dynamic allocation and
sharing of computing resources, minimizing idle time and improving overall efficiency.
7.Backup and Disaster Recovery: Cloud platforms offer built-in backup and disaster recovery solutions,
ensuring data resilience and providing a reliable mechanism for data backup and restoration.
Disadvantages of cloud
computing
 Downtime :Businesses receive cloud computing services only through the Internet. When
there is an internet outage or weak connectivity, services get interrupted and this increases
downtime. Therefore, one of the major criticisms of cloud computing is its high dependency
on the Internet.
 Security Concerns: Cloud computing raises concerns about data security and
privacy, as sensitive information is stored externally, potentially making it
vulnerable to unauthorized access or breaches.
 Vendor Lock-In: Once an organization adopts a specific cloud provider's
services and technologies, switching to another provider can be complex and
costly, some factors such as data migration challenges, differences in service
offerings, compatibility issues, varying cost structures, and the need for
retraining teams.
Cluster Computing
 Clusters of cooperative computers refer to a group of interconnected
computing devices working together to achieve a common goal. This
collaborative approach enhances processing power, reliability, and
scalability.
 Cluster computing enables faster and more efficient data processing by
distributing tasks across multiple interconnected computers, ensuring
scalability and fault tolerance for demanding computational workloads.
 Cluster computing allows tasks to be divided into smaller sub-tasks that can
be processed simultaneously across multiple nodes. This parallel processing
significantly accelerates the execution of complex computations.
 Companies use cluster computing for several reasons, mainly to address the
challenges associated with large-scale and complex computational tasks.
Cluster Computing examples
1.Online Search Engines:
•Application: Search engines like Google use cluster computing to process search
queries, index web pages, and deliver relevant results rapidly, enhancing the user
search experience.
2.Social Media Platforms:
•Application: Social media platforms leverage cluster computing for managing vast
amounts of user-generated content, facilitating real-time updates, and ensuring
seamless interaction across diverse devices
3.Voice Assistants:
• Application: Voice-activated devices like smart speakers use cluster computing
for natural language processing, voice recognition, and responding to user
commands in real-time.
Advantages of Cluster Computing :
 1. High Performance :
The systems offer better and enhanced performance than that of mainframe computer networks.
 2. Easy to manage :
Cluster Computing is manageable and easy to implement.
 3. Scalable :
Resources can be added to the clusters accordingly.
 4. Expandability :
Computer clusters can be expanded easily by adding additional computers to the network. Cluster
computing is capable of combining several additional resources or the networks to the existing
computer system.
 5. Availability :
The other nodes will be active when one node gets failed and will function as a proxy for the failed
node. This makes sure for enhanced availability.
Disadvantages of Cluster
Computing :
 1. High cost :
It is not so much cost-effective due to its high hardware and its design.
 2. Problem in finding fault :
It is difficult to find which component has a fault.
 3. More space is needed :
Infrastructure may increase as more servers are needed to manage and
monitor.
Distributed Computing
 Distributed computing is a computing that involves the use of multiple interconnected computers (nodes)
to work together and solve a computational problem or perform a task.
 In distributed computing, the workload is divided among the nodes, and each node contributes its
processing power, memory, and storage to collectively achieve a common goal.
 Involves the use of multiple interconnected computers within a single organization or network to
improve performance and resource utilization. The nodes are typically within the same administrative
domain.
Grid Computing
 Grid computing is a form of distributed computing that involves the pooling and sharing of computing
resources from multiple, often diverse, administrative domains to work on a common task or solve a
complex problem.
 Unlike traditional distributed computing, which may involve a more homogeneous set of resources
within a single organization, grid computing extends the idea of resource sharing to a broader scale,
often across institutional or organizational boundaries.
grid computing
architecture 
Grid computing architecture :
 A typical grid computing network consists of three machine types:
• Control node/server: A control node is a server or a group of servers that
administers the entire network and maintains the record for resources in a
network pool.
• Provider/grid node: A provider or grid node is a computer that contributes
its resources to the network resource pool.
• User: A user refers to the computer that uses the resources on the network
to complete the task.
Advantages of Grid Computing:
1. Resource Sharing: Grid computing allows clients to share computing resources across a network,
optimizing resource utilization and avoiding redundancy.
2. Improved Performance: Clients benefit from enhanced processing power and faster task execution by
tapping into the collective resources of the grid.
3. Cost Savings: Clients can achieve cost efficiencies by participating in grid computing, as they utilize shared
resources without the need for substantial investments in dedicated infrastructure.
4. Scalability: Grid computing provides clients with the flexibility to scale their computational capabilities
based on demand, ensuring they can adapt to changing workloads efficiently.
5. It is not centralized, as there are no servers required, except the control node which is just used for
controlling and not for processing.
6. Multiple heterogeneous machines i.e. machines with different Operating Systems can use a single grid
computing network.
Disadvantages of Grid Computing:
1. Security Concerns: Grid computing introduces security challenges, as data is distributed
across multiple nodes, raising the risk of unauthorized access or data breaches.
2. Complex Implementation: Implementing and managing grid computing systems can be
complex, requiring specialized knowledge and expertise, which may pose challenges for
some organizations.
3. Interoperability Issues: Ensuring seamless interoperability among diverse computing
resources, platforms, and technologies in a grid environment can be challenging and may
lead to integration issues.
4. Dependency on Network Connectivity: Grid computing relies heavily on network
connectivity; any disruptions or latency in communication can impact performance and
task execution.
An Introduction to Cloud Computing: Benefits and Challenges
Ad

More Related Content

What's hot (20)

Software Performance Engineering Services
Software Performance Engineering ServicesSoftware Performance Engineering Services
Software Performance Engineering Services
Collaborative Consulting
 
Lets talk about: Azure Kubernetes Service (AKS)
Lets talk about: Azure Kubernetes Service (AKS)Lets talk about: Azure Kubernetes Service (AKS)
Lets talk about: Azure Kubernetes Service (AKS)
Pedro Sousa
 
AWS의 다양한 Compute 서비스(EC2, Lambda, ECS, Batch, Elastic Beanstalk)의 특징 이해하기 - 김...
AWS의 다양한 Compute 서비스(EC2, Lambda, ECS, Batch, Elastic Beanstalk)의 특징 이해하기 - 김...AWS의 다양한 Compute 서비스(EC2, Lambda, ECS, Batch, Elastic Beanstalk)의 특징 이해하기 - 김...
AWS의 다양한 Compute 서비스(EC2, Lambda, ECS, Batch, Elastic Beanstalk)의 특징 이해하기 - 김...
Amazon Web Services Korea
 
Ppt cloud deployment
Ppt cloud deploymentPpt cloud deployment
Ppt cloud deployment
Virendra Ruhela
 
AWS Summit Seoul 2023 | AWS의 관리형 VDI 서비스! 알고 계셨나요?
AWS Summit Seoul 2023 | AWS의 관리형 VDI 서비스! 알고 계셨나요?AWS Summit Seoul 2023 | AWS의 관리형 VDI 서비스! 알고 계셨나요?
AWS Summit Seoul 2023 | AWS의 관리형 VDI 서비스! 알고 계셨나요?
Amazon Web Services Korea
 
Aws
AwsAws
Aws
mahes3231
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
AWS Summit Seoul 2023 | Amazon Neptune 및 Elastic을 이용한 추천 서비스 및 검색 플랫폼 구축하기
AWS Summit Seoul 2023 | Amazon Neptune 및 Elastic을 이용한 추천 서비스 및 검색 플랫폼 구축하기AWS Summit Seoul 2023 | Amazon Neptune 및 Elastic을 이용한 추천 서비스 및 검색 플랫폼 구축하기
AWS Summit Seoul 2023 | Amazon Neptune 및 Elastic을 이용한 추천 서비스 및 검색 플랫폼 구축하기
Amazon Web Services Korea
 
[Partner TechForum] 고객을 360도로 이해하고 수익으로 연결하는 글로벌 선도 금융 기업들의 데이터 플랫폼 활용 사례
[Partner TechForum] 고객을 360도로 이해하고 수익으로 연결하는 글로벌 선도 금융 기업들의 데이터 플랫폼 활용 사례[Partner TechForum] 고객을 360도로 이해하고 수익으로 연결하는 글로벌 선도 금융 기업들의 데이터 플랫폼 활용 사례
[Partner TechForum] 고객을 360도로 이해하고 수익으로 연결하는 글로벌 선도 금융 기업들의 데이터 플랫폼 활용 사례
Amazon Web Services Korea
 
Microsoft Azure Fundamentals
Microsoft Azure FundamentalsMicrosoft Azure Fundamentals
Microsoft Azure Fundamentals
Adwait Ullal
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce Org
Salesforce Admins
 
Azure vm introduction
Azure  vm introductionAzure  vm introduction
Azure vm introduction
Lalit Rawat
 
Azure
AzureAzure
Azure
Kiran Bavariya
 
Salesforce Integration Patterns
Salesforce Integration PatternsSalesforce Integration Patterns
Salesforce Integration Patterns
usolutions
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 
Privilege Management Solution
Privilege Management SolutionPrivilege Management Solution
Privilege Management Solution
Syed Sajjad Jaffer Rizvi
 
Introduction to Microsoft Azure
Introduction to Microsoft AzureIntroduction to Microsoft Azure
Introduction to Microsoft Azure
Martyn Coupland
 
Amazon Connect를 이용한 장애 대응도구 개발기 - 현창훈 (HBSmith) :: AWS Community Day 2020
Amazon Connect를 이용한 장애 대응도구 개발기 - 현창훈 (HBSmith) :: AWS Community Day 2020Amazon Connect를 이용한 장애 대응도구 개발기 - 현창훈 (HBSmith) :: AWS Community Day 2020
Amazon Connect를 이용한 장애 대응도구 개발기 - 현창훈 (HBSmith) :: AWS Community Day 2020
AWSKRUG - AWS한국사용자모임
 
Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS Cloud
Tom Laszewski
 
Lets talk about: Azure Kubernetes Service (AKS)
Lets talk about: Azure Kubernetes Service (AKS)Lets talk about: Azure Kubernetes Service (AKS)
Lets talk about: Azure Kubernetes Service (AKS)
Pedro Sousa
 
AWS의 다양한 Compute 서비스(EC2, Lambda, ECS, Batch, Elastic Beanstalk)의 특징 이해하기 - 김...
AWS의 다양한 Compute 서비스(EC2, Lambda, ECS, Batch, Elastic Beanstalk)의 특징 이해하기 - 김...AWS의 다양한 Compute 서비스(EC2, Lambda, ECS, Batch, Elastic Beanstalk)의 특징 이해하기 - 김...
AWS의 다양한 Compute 서비스(EC2, Lambda, ECS, Batch, Elastic Beanstalk)의 특징 이해하기 - 김...
Amazon Web Services Korea
 
AWS Summit Seoul 2023 | AWS의 관리형 VDI 서비스! 알고 계셨나요?
AWS Summit Seoul 2023 | AWS의 관리형 VDI 서비스! 알고 계셨나요?AWS Summit Seoul 2023 | AWS의 관리형 VDI 서비스! 알고 계셨나요?
AWS Summit Seoul 2023 | AWS의 관리형 VDI 서비스! 알고 계셨나요?
Amazon Web Services Korea
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
AWS Summit Seoul 2023 | Amazon Neptune 및 Elastic을 이용한 추천 서비스 및 검색 플랫폼 구축하기
AWS Summit Seoul 2023 | Amazon Neptune 및 Elastic을 이용한 추천 서비스 및 검색 플랫폼 구축하기AWS Summit Seoul 2023 | Amazon Neptune 및 Elastic을 이용한 추천 서비스 및 검색 플랫폼 구축하기
AWS Summit Seoul 2023 | Amazon Neptune 및 Elastic을 이용한 추천 서비스 및 검색 플랫폼 구축하기
Amazon Web Services Korea
 
[Partner TechForum] 고객을 360도로 이해하고 수익으로 연결하는 글로벌 선도 금융 기업들의 데이터 플랫폼 활용 사례
[Partner TechForum] 고객을 360도로 이해하고 수익으로 연결하는 글로벌 선도 금융 기업들의 데이터 플랫폼 활용 사례[Partner TechForum] 고객을 360도로 이해하고 수익으로 연결하는 글로벌 선도 금융 기업들의 데이터 플랫폼 활용 사례
[Partner TechForum] 고객을 360도로 이해하고 수익으로 연결하는 글로벌 선도 금융 기업들의 데이터 플랫폼 활용 사례
Amazon Web Services Korea
 
Microsoft Azure Fundamentals
Microsoft Azure FundamentalsMicrosoft Azure Fundamentals
Microsoft Azure Fundamentals
Adwait Ullal
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce Org
Salesforce Admins
 
Azure vm introduction
Azure  vm introductionAzure  vm introduction
Azure vm introduction
Lalit Rawat
 
Salesforce Integration Patterns
Salesforce Integration PatternsSalesforce Integration Patterns
Salesforce Integration Patterns
usolutions
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 
Introduction to Microsoft Azure
Introduction to Microsoft AzureIntroduction to Microsoft Azure
Introduction to Microsoft Azure
Martyn Coupland
 
Amazon Connect를 이용한 장애 대응도구 개발기 - 현창훈 (HBSmith) :: AWS Community Day 2020
Amazon Connect를 이용한 장애 대응도구 개발기 - 현창훈 (HBSmith) :: AWS Community Day 2020Amazon Connect를 이용한 장애 대응도구 개발기 - 현창훈 (HBSmith) :: AWS Community Day 2020
Amazon Connect를 이용한 장애 대응도구 개발기 - 현창훈 (HBSmith) :: AWS Community Day 2020
AWSKRUG - AWS한국사용자모임
 
Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS Cloud
Tom Laszewski
 

Similar to An Introduction to Cloud Computing: Benefits and Challenges (20)

Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
Sitamarhi Institute of Technology
 
Cloud Basics.pptx
Cloud Basics.pptxCloud Basics.pptx
Cloud Basics.pptx
ramanathan2006
 
Unit I Fundamentals of Cloud Computing.pptx
Unit I Fundamentals of Cloud Computing.pptxUnit I Fundamentals of Cloud Computing.pptx
Unit I Fundamentals of Cloud Computing.pptx
Rahul Borate
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
Helly Patel
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Utsav mistry
 
cloud computing
cloud computingcloud computing
cloud computing
Kalai Selvi
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
IJEEE
 
Unit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptxUnit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptx
SumitSaini169007
 
Clpud-Computing IT business management-PPT.pptx
Clpud-Computing IT business management-PPT.pptxClpud-Computing IT business management-PPT.pptx
Clpud-Computing IT business management-PPT.pptx
krutikamms202475
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
Ravi Yasas
 
fundamentals of cloud computing and depth unit
fundamentals of cloud computing and depth unitfundamentals of cloud computing and depth unit
fundamentals of cloud computing and depth unit
nitushasoni1
 
Cloud Computing education need for every beginner
Cloud Computing education  need for every beginnerCloud Computing education  need for every beginner
Cloud Computing education need for every beginner
harishshinhan
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
dannyijwest
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
NASIMTAHIR2
 
Chapter I Introduction to Cloud Computing.pptx
Chapter I Introduction to Cloud Computing.pptxChapter I Introduction to Cloud Computing.pptx
Chapter I Introduction to Cloud Computing.pptx
atakiltibrhanu1
 
The Fundamentals and Essentials of Cloud Computing.
The Fundamentals and Essentials of Cloud Computing.The Fundamentals and Essentials of Cloud Computing.
The Fundamentals and Essentials of Cloud Computing.
AkhileshTayade1
 
this is the presentation on the Cloud ppt.pptx
this is the presentation on the Cloud ppt.pptxthis is the presentation on the Cloud ppt.pptx
this is the presentation on the Cloud ppt.pptx
laharianisetty14
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
this is the presentation on the cloud.ppt
this is the presentation on the cloud.pptthis is the presentation on the cloud.ppt
this is the presentation on the cloud.ppt
anisettilahari14
 
Unit I Fundamentals of Cloud Computing.pptx
Unit I Fundamentals of Cloud Computing.pptxUnit I Fundamentals of Cloud Computing.pptx
Unit I Fundamentals of Cloud Computing.pptx
Rahul Borate
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
Helly Patel
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
IJEEE
 
Unit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptxUnit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptx
SumitSaini169007
 
Clpud-Computing IT business management-PPT.pptx
Clpud-Computing IT business management-PPT.pptxClpud-Computing IT business management-PPT.pptx
Clpud-Computing IT business management-PPT.pptx
krutikamms202475
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
Ravi Yasas
 
fundamentals of cloud computing and depth unit
fundamentals of cloud computing and depth unitfundamentals of cloud computing and depth unit
fundamentals of cloud computing and depth unit
nitushasoni1
 
Cloud Computing education need for every beginner
Cloud Computing education  need for every beginnerCloud Computing education  need for every beginner
Cloud Computing education need for every beginner
harishshinhan
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
dannyijwest
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
NASIMTAHIR2
 
Chapter I Introduction to Cloud Computing.pptx
Chapter I Introduction to Cloud Computing.pptxChapter I Introduction to Cloud Computing.pptx
Chapter I Introduction to Cloud Computing.pptx
atakiltibrhanu1
 
The Fundamentals and Essentials of Cloud Computing.
The Fundamentals and Essentials of Cloud Computing.The Fundamentals and Essentials of Cloud Computing.
The Fundamentals and Essentials of Cloud Computing.
AkhileshTayade1
 
this is the presentation on the Cloud ppt.pptx
this is the presentation on the Cloud ppt.pptxthis is the presentation on the Cloud ppt.pptx
this is the presentation on the Cloud ppt.pptx
laharianisetty14
 
this is the presentation on the cloud.ppt
this is the presentation on the cloud.pptthis is the presentation on the cloud.ppt
this is the presentation on the cloud.ppt
anisettilahari14
 
Ad

More from Sisodetrupti (10)

Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Sisodetrupti
 
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Sisodetrupti
 
Understanding the Transport Layer: MUX, DEMUX, Process-to-Process Delivery, T...
Understanding the Transport Layer: MUX, DEMUX, Process-to-Process Delivery, T...Understanding the Transport Layer: MUX, DEMUX, Process-to-Process Delivery, T...
Understanding the Transport Layer: MUX, DEMUX, Process-to-Process Delivery, T...
Sisodetrupti
 
Network layer in computer networks .pptx
Network layer in computer networks .pptxNetwork layer in computer networks .pptx
Network layer in computer networks .pptx
Sisodetrupti
 
Multiple Access Control Layers in computer network.pptx
Multiple Access Control Layers in computer network.pptxMultiple Access Control Layers in computer network.pptx
Multiple Access Control Layers in computer network.pptx
Sisodetrupti
 
Multiple Access Control Layers in computer network.pptx
Multiple Access Control Layers in computer network.pptxMultiple Access Control Layers in computer network.pptx
Multiple Access Control Layers in computer network.pptx
Sisodetrupti
 
PARALLEL DATABASE SYSTEM in Computer Science.pptx
PARALLEL DATABASE SYSTEM in Computer Science.pptxPARALLEL DATABASE SYSTEM in Computer Science.pptx
PARALLEL DATABASE SYSTEM in Computer Science.pptx
Sisodetrupti
 
Distributed Database system in Computer Science.pptx
Distributed  Database  system  in Computer Science.pptxDistributed  Database  system  in Computer Science.pptx
Distributed Database system in Computer Science.pptx
Sisodetrupti
 
COMPUTER NETWORK INTRODUCTION SYBCS.pptx
COMPUTER NETWORK INTRODUCTION SYBCS.pptxCOMPUTER NETWORK INTRODUCTION SYBCS.pptx
COMPUTER NETWORK INTRODUCTION SYBCS.pptx
Sisodetrupti
 
Introduction to Advanced Databases .pptx
Introduction to Advanced Databases .pptxIntroduction to Advanced Databases .pptx
Introduction to Advanced Databases .pptx
Sisodetrupti
 
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Sisodetrupti
 
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Sisodetrupti
 
Understanding the Transport Layer: MUX, DEMUX, Process-to-Process Delivery, T...
Understanding the Transport Layer: MUX, DEMUX, Process-to-Process Delivery, T...Understanding the Transport Layer: MUX, DEMUX, Process-to-Process Delivery, T...
Understanding the Transport Layer: MUX, DEMUX, Process-to-Process Delivery, T...
Sisodetrupti
 
Network layer in computer networks .pptx
Network layer in computer networks .pptxNetwork layer in computer networks .pptx
Network layer in computer networks .pptx
Sisodetrupti
 
Multiple Access Control Layers in computer network.pptx
Multiple Access Control Layers in computer network.pptxMultiple Access Control Layers in computer network.pptx
Multiple Access Control Layers in computer network.pptx
Sisodetrupti
 
Multiple Access Control Layers in computer network.pptx
Multiple Access Control Layers in computer network.pptxMultiple Access Control Layers in computer network.pptx
Multiple Access Control Layers in computer network.pptx
Sisodetrupti
 
PARALLEL DATABASE SYSTEM in Computer Science.pptx
PARALLEL DATABASE SYSTEM in Computer Science.pptxPARALLEL DATABASE SYSTEM in Computer Science.pptx
PARALLEL DATABASE SYSTEM in Computer Science.pptx
Sisodetrupti
 
Distributed Database system in Computer Science.pptx
Distributed  Database  system  in Computer Science.pptxDistributed  Database  system  in Computer Science.pptx
Distributed Database system in Computer Science.pptx
Sisodetrupti
 
COMPUTER NETWORK INTRODUCTION SYBCS.pptx
COMPUTER NETWORK INTRODUCTION SYBCS.pptxCOMPUTER NETWORK INTRODUCTION SYBCS.pptx
COMPUTER NETWORK INTRODUCTION SYBCS.pptx
Sisodetrupti
 
Introduction to Advanced Databases .pptx
Introduction to Advanced Databases .pptxIntroduction to Advanced Databases .pptx
Introduction to Advanced Databases .pptx
Sisodetrupti
 
Ad

Recently uploaded (20)

A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
Sérgio Sacani
 
Issues in using AI in academic publishing.pdf
Issues in using AI in academic publishing.pdfIssues in using AI in academic publishing.pdf
Issues in using AI in academic publishing.pdf
Angelo Salatino
 
CORONARY ARTERY BYPASS GRAFTING (1).pptx
CORONARY ARTERY BYPASS GRAFTING (1).pptxCORONARY ARTERY BYPASS GRAFTING (1).pptx
CORONARY ARTERY BYPASS GRAFTING (1).pptx
DharaniJajula
 
Freud e sua Historia na Psicanalise Psic
Freud e sua Historia na Psicanalise PsicFreud e sua Historia na Psicanalise Psic
Freud e sua Historia na Psicanalise Psic
StefannyGoffi1
 
Approach to Upper GASTRO INTESTINAL Bleed.pptx
Approach to Upper GASTRO INTESTINAL Bleed.pptxApproach to Upper GASTRO INTESTINAL Bleed.pptx
Approach to Upper GASTRO INTESTINAL Bleed.pptx
PrabakaranNatarajan10
 
Antimalarial drug Medicinal Chemistry III
Antimalarial drug Medicinal Chemistry IIIAntimalarial drug Medicinal Chemistry III
Antimalarial drug Medicinal Chemistry III
HRUTUJA WAGH
 
Electroencephalogram_ wave components_Aignificancr
Electroencephalogram_ wave components_AignificancrElectroencephalogram_ wave components_Aignificancr
Electroencephalogram_ wave components_Aignificancr
klynct
 
Subject name: Introduction to psychology
Subject name: Introduction to psychologySubject name: Introduction to psychology
Subject name: Introduction to psychology
beebussy155
 
Discrete choice experiments: Environmental Improvements to Airthrey Loch Lake...
Discrete choice experiments: Environmental Improvements to Airthrey Loch Lake...Discrete choice experiments: Environmental Improvements to Airthrey Loch Lake...
Discrete choice experiments: Environmental Improvements to Airthrey Loch Lake...
Professional Content Writing's
 
Preparation of Experimental Animals.pptx
Preparation of Experimental Animals.pptxPreparation of Experimental Animals.pptx
Preparation of Experimental Animals.pptx
klynct
 
Reticular formation_groups_organization_
Reticular formation_groups_organization_Reticular formation_groups_organization_
Reticular formation_groups_organization_
klynct
 
Chaos and Psychology: Modeling the Human Mind through Nonlinear Dynamical Sys...
Chaos and Psychology: Modeling the Human Mind through Nonlinear Dynamical Sys...Chaos and Psychology: Modeling the Human Mind through Nonlinear Dynamical Sys...
Chaos and Psychology: Modeling the Human Mind through Nonlinear Dynamical Sys...
Helena Celeste Mata Rico
 
Transgenic Mice in Cancer Research - Creative Biolabs
Transgenic Mice in Cancer Research - Creative BiolabsTransgenic Mice in Cancer Research - Creative Biolabs
Transgenic Mice in Cancer Research - Creative Biolabs
Creative-Biolabs
 
Anti fungal agents Medicinal Chemistry III
Anti fungal agents Medicinal Chemistry  IIIAnti fungal agents Medicinal Chemistry  III
Anti fungal agents Medicinal Chemistry III
HRUTUJA WAGH
 
Pharmacologically active constituents.pdf
Pharmacologically active constituents.pdfPharmacologically active constituents.pdf
Pharmacologically active constituents.pdf
Nistarini College, Purulia (W.B) India
 
Somato_Sensory _ somatomotor_Nervous_System.pptx
Somato_Sensory _ somatomotor_Nervous_System.pptxSomato_Sensory _ somatomotor_Nervous_System.pptx
Somato_Sensory _ somatomotor_Nervous_System.pptx
klynct
 
Brief Presentation on Garment Washing.pdf
Brief Presentation on Garment Washing.pdfBrief Presentation on Garment Washing.pdf
Brief Presentation on Garment Washing.pdf
BharathKumar556689
 
BIODIESEL AND ROLEs OF GLYCEROL PRODUCTION AND APPLICATION
BIODIESEL AND ROLEs OF GLYCEROL PRODUCTION AND APPLICATIONBIODIESEL AND ROLEs OF GLYCEROL PRODUCTION AND APPLICATION
BIODIESEL AND ROLEs OF GLYCEROL PRODUCTION AND APPLICATION
KrishnaShastri7
 
Funakoshi_ZymoResearch_2024-2025_catalog
Funakoshi_ZymoResearch_2024-2025_catalogFunakoshi_ZymoResearch_2024-2025_catalog
Funakoshi_ZymoResearch_2024-2025_catalog
fu7koshi
 
physics of renewable energy sources .pptx
physics of renewable energy sources  .pptxphysics of renewable energy sources  .pptx
physics of renewable energy sources .pptx
zaramunir6
 
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
A Massive Black Hole 0.8kpc from the Host Nucleus Revealed by the Offset Tida...
Sérgio Sacani
 
Issues in using AI in academic publishing.pdf
Issues in using AI in academic publishing.pdfIssues in using AI in academic publishing.pdf
Issues in using AI in academic publishing.pdf
Angelo Salatino
 
CORONARY ARTERY BYPASS GRAFTING (1).pptx
CORONARY ARTERY BYPASS GRAFTING (1).pptxCORONARY ARTERY BYPASS GRAFTING (1).pptx
CORONARY ARTERY BYPASS GRAFTING (1).pptx
DharaniJajula
 
Freud e sua Historia na Psicanalise Psic
Freud e sua Historia na Psicanalise PsicFreud e sua Historia na Psicanalise Psic
Freud e sua Historia na Psicanalise Psic
StefannyGoffi1
 
Approach to Upper GASTRO INTESTINAL Bleed.pptx
Approach to Upper GASTRO INTESTINAL Bleed.pptxApproach to Upper GASTRO INTESTINAL Bleed.pptx
Approach to Upper GASTRO INTESTINAL Bleed.pptx
PrabakaranNatarajan10
 
Antimalarial drug Medicinal Chemistry III
Antimalarial drug Medicinal Chemistry IIIAntimalarial drug Medicinal Chemistry III
Antimalarial drug Medicinal Chemistry III
HRUTUJA WAGH
 
Electroencephalogram_ wave components_Aignificancr
Electroencephalogram_ wave components_AignificancrElectroencephalogram_ wave components_Aignificancr
Electroencephalogram_ wave components_Aignificancr
klynct
 
Subject name: Introduction to psychology
Subject name: Introduction to psychologySubject name: Introduction to psychology
Subject name: Introduction to psychology
beebussy155
 
Discrete choice experiments: Environmental Improvements to Airthrey Loch Lake...
Discrete choice experiments: Environmental Improvements to Airthrey Loch Lake...Discrete choice experiments: Environmental Improvements to Airthrey Loch Lake...
Discrete choice experiments: Environmental Improvements to Airthrey Loch Lake...
Professional Content Writing's
 
Preparation of Experimental Animals.pptx
Preparation of Experimental Animals.pptxPreparation of Experimental Animals.pptx
Preparation of Experimental Animals.pptx
klynct
 
Reticular formation_groups_organization_
Reticular formation_groups_organization_Reticular formation_groups_organization_
Reticular formation_groups_organization_
klynct
 
Chaos and Psychology: Modeling the Human Mind through Nonlinear Dynamical Sys...
Chaos and Psychology: Modeling the Human Mind through Nonlinear Dynamical Sys...Chaos and Psychology: Modeling the Human Mind through Nonlinear Dynamical Sys...
Chaos and Psychology: Modeling the Human Mind through Nonlinear Dynamical Sys...
Helena Celeste Mata Rico
 
Transgenic Mice in Cancer Research - Creative Biolabs
Transgenic Mice in Cancer Research - Creative BiolabsTransgenic Mice in Cancer Research - Creative Biolabs
Transgenic Mice in Cancer Research - Creative Biolabs
Creative-Biolabs
 
Anti fungal agents Medicinal Chemistry III
Anti fungal agents Medicinal Chemistry  IIIAnti fungal agents Medicinal Chemistry  III
Anti fungal agents Medicinal Chemistry III
HRUTUJA WAGH
 
Somato_Sensory _ somatomotor_Nervous_System.pptx
Somato_Sensory _ somatomotor_Nervous_System.pptxSomato_Sensory _ somatomotor_Nervous_System.pptx
Somato_Sensory _ somatomotor_Nervous_System.pptx
klynct
 
Brief Presentation on Garment Washing.pdf
Brief Presentation on Garment Washing.pdfBrief Presentation on Garment Washing.pdf
Brief Presentation on Garment Washing.pdf
BharathKumar556689
 
BIODIESEL AND ROLEs OF GLYCEROL PRODUCTION AND APPLICATION
BIODIESEL AND ROLEs OF GLYCEROL PRODUCTION AND APPLICATIONBIODIESEL AND ROLEs OF GLYCEROL PRODUCTION AND APPLICATION
BIODIESEL AND ROLEs OF GLYCEROL PRODUCTION AND APPLICATION
KrishnaShastri7
 
Funakoshi_ZymoResearch_2024-2025_catalog
Funakoshi_ZymoResearch_2024-2025_catalogFunakoshi_ZymoResearch_2024-2025_catalog
Funakoshi_ZymoResearch_2024-2025_catalog
fu7koshi
 
physics of renewable energy sources .pptx
physics of renewable energy sources  .pptxphysics of renewable energy sources  .pptx
physics of renewable energy sources .pptx
zaramunir6
 

An Introduction to Cloud Computing: Benefits and Challenges

  • 2. What is Cloud Computing?  It is the use of remote servers on the internet to store, manage and process data rather than local servers.  It includes on-demand access to resources like storage, processing power, and applications. Users can scale resources dynamically, pay for what they use, and access services from various devices.  People use cloud computing in various aspects of their daily lives, often without even realizing it.  For example; 1. File Storage: Store and access documents, photos, and videos on cloud storage services like Google Drive or Dropbox. 2. Email: Use cloud-based email services such as Gmail or Outlook for seamless access to emails and attachments from different devices.
  • 3. Cloud Computing real life examples: 1. Social Media: Share updates, photos, and videos on platforms like Facebook and Instagram, which leverage cloud infrastructure. 2. Streaming Content: Enjoy movies, music, and TV shows through cloud-based streaming services like Netflix and Spotify. 3. Productivity Tools: Collaborate on documents and spreadsheets in real-time using cloud-based productivity suites like Google Docs, Microsoft Word, and Excel online. This allows users to create, edit, and collaborate on documents in real-time from different locations. 4. Backup and Sync: Automatically back up and synchronize data, including photos and contacts, using cloud services like Google Photos. 5. Mobile Apps: Access apps and games on different devices, with cloud storage preserving settings and progress. 6. Online Shopping: Shop securely on e-commerce platforms like Amazon, benefiting from cloud infrastructure for seamless transactions. 7. Navigation: Utilize cloud-powered GPS services like Google Maps for real-time navigation and traffic updates.
  • 5. Architecture of Cloud Computing The architecture of cloud computing encompasses both frontend and backend components. The frontend is what users interact with directly, while the backend is the underlying infrastructure and services that support the frontend. Frontend Architecture: 1. Client Infrastructure: 1. The UI is the part of the application that users interact with. 2. It can be a web-based interface, mobile app, or any other form of user interaction. Backend Architecture:  Cloud Service Provider: Infrastructure provided by cloud service providers (e.g., AWS, Azure, Google Cloud) that host and manage the backend infrastructure.
  • 6. Architecture of Cloud Computing  Runtime Cloud- Runtime cloud in backend provides the execution and Runtime platform/environment to the Virtual machine.  Storage – Storage in backend provides flexible and scalable storage service and management of stored data.  Infrastructure – Cloud Infrastructure in backend refers to the hardware and software components of cloud like it includes servers, storage, network devices, virtualization software etc.  Management – Management in backend refers to management of backend components like application, service, runtime cloud, storage, infrastructure, and other security mechanisms etc.  Security – Security in backend refers to implementation of different security mechanisms in the backend for secure cloud resources, systems, files, and infrastructure to end-users.  Application – Application in backend refers to a software or platform to which client accesses. Means it provides the service in backend as per the client requirement.
  • 7. Advantages of cloud computing 1. Cost Efficiency: Cloud computing eliminates the need for upfront capital investment in hardware and allows businesses to pay for resources based on actual usage, optimizing costs. 2. Scalability: Cloud services provide the flexibility to scale computing resources up or down, ensuring that organizations can adapt to changing workloads and demands efficiently. 3.Reliability and High Availability: Cloud providers offer redundant and geographically distributed infrastructure, reducing the risk of downtime and ensuring continuous availability of services. 4.Security: Reputable cloud providers implement robust security measures, including encryption, identity management, and compliance certifications, enhancing data protection and privacy. 5.Automatic Updates and Maintenance: Cloud providers handle system updates and maintenance tasks, ensuring that businesses always have access to the latest features and security patches without manual intervention. 6.Resource Utilization: Cloud services optimize resource usage by allowing dynamic allocation and sharing of computing resources, minimizing idle time and improving overall efficiency. 7.Backup and Disaster Recovery: Cloud platforms offer built-in backup and disaster recovery solutions, ensuring data resilience and providing a reliable mechanism for data backup and restoration.
  • 8. Disadvantages of cloud computing  Downtime :Businesses receive cloud computing services only through the Internet. When there is an internet outage or weak connectivity, services get interrupted and this increases downtime. Therefore, one of the major criticisms of cloud computing is its high dependency on the Internet.  Security Concerns: Cloud computing raises concerns about data security and privacy, as sensitive information is stored externally, potentially making it vulnerable to unauthorized access or breaches.  Vendor Lock-In: Once an organization adopts a specific cloud provider's services and technologies, switching to another provider can be complex and costly, some factors such as data migration challenges, differences in service offerings, compatibility issues, varying cost structures, and the need for retraining teams.
  • 9. Cluster Computing  Clusters of cooperative computers refer to a group of interconnected computing devices working together to achieve a common goal. This collaborative approach enhances processing power, reliability, and scalability.  Cluster computing enables faster and more efficient data processing by distributing tasks across multiple interconnected computers, ensuring scalability and fault tolerance for demanding computational workloads.  Cluster computing allows tasks to be divided into smaller sub-tasks that can be processed simultaneously across multiple nodes. This parallel processing significantly accelerates the execution of complex computations.  Companies use cluster computing for several reasons, mainly to address the challenges associated with large-scale and complex computational tasks.
  • 10. Cluster Computing examples 1.Online Search Engines: •Application: Search engines like Google use cluster computing to process search queries, index web pages, and deliver relevant results rapidly, enhancing the user search experience. 2.Social Media Platforms: •Application: Social media platforms leverage cluster computing for managing vast amounts of user-generated content, facilitating real-time updates, and ensuring seamless interaction across diverse devices 3.Voice Assistants: • Application: Voice-activated devices like smart speakers use cluster computing for natural language processing, voice recognition, and responding to user commands in real-time.
  • 11. Advantages of Cluster Computing :  1. High Performance : The systems offer better and enhanced performance than that of mainframe computer networks.  2. Easy to manage : Cluster Computing is manageable and easy to implement.  3. Scalable : Resources can be added to the clusters accordingly.  4. Expandability : Computer clusters can be expanded easily by adding additional computers to the network. Cluster computing is capable of combining several additional resources or the networks to the existing computer system.  5. Availability : The other nodes will be active when one node gets failed and will function as a proxy for the failed node. This makes sure for enhanced availability.
  • 12. Disadvantages of Cluster Computing :  1. High cost : It is not so much cost-effective due to its high hardware and its design.  2. Problem in finding fault : It is difficult to find which component has a fault.  3. More space is needed : Infrastructure may increase as more servers are needed to manage and monitor.
  • 13. Distributed Computing  Distributed computing is a computing that involves the use of multiple interconnected computers (nodes) to work together and solve a computational problem or perform a task.  In distributed computing, the workload is divided among the nodes, and each node contributes its processing power, memory, and storage to collectively achieve a common goal.  Involves the use of multiple interconnected computers within a single organization or network to improve performance and resource utilization. The nodes are typically within the same administrative domain.
  • 14. Grid Computing  Grid computing is a form of distributed computing that involves the pooling and sharing of computing resources from multiple, often diverse, administrative domains to work on a common task or solve a complex problem.  Unlike traditional distributed computing, which may involve a more homogeneous set of resources within a single organization, grid computing extends the idea of resource sharing to a broader scale, often across institutional or organizational boundaries. grid computing architecture 
  • 15. Grid computing architecture :  A typical grid computing network consists of three machine types: • Control node/server: A control node is a server or a group of servers that administers the entire network and maintains the record for resources in a network pool. • Provider/grid node: A provider or grid node is a computer that contributes its resources to the network resource pool. • User: A user refers to the computer that uses the resources on the network to complete the task.
  • 16. Advantages of Grid Computing: 1. Resource Sharing: Grid computing allows clients to share computing resources across a network, optimizing resource utilization and avoiding redundancy. 2. Improved Performance: Clients benefit from enhanced processing power and faster task execution by tapping into the collective resources of the grid. 3. Cost Savings: Clients can achieve cost efficiencies by participating in grid computing, as they utilize shared resources without the need for substantial investments in dedicated infrastructure. 4. Scalability: Grid computing provides clients with the flexibility to scale their computational capabilities based on demand, ensuring they can adapt to changing workloads efficiently. 5. It is not centralized, as there are no servers required, except the control node which is just used for controlling and not for processing. 6. Multiple heterogeneous machines i.e. machines with different Operating Systems can use a single grid computing network.
  • 17. Disadvantages of Grid Computing: 1. Security Concerns: Grid computing introduces security challenges, as data is distributed across multiple nodes, raising the risk of unauthorized access or data breaches. 2. Complex Implementation: Implementing and managing grid computing systems can be complex, requiring specialized knowledge and expertise, which may pose challenges for some organizations. 3. Interoperability Issues: Ensuring seamless interoperability among diverse computing resources, platforms, and technologies in a grid environment can be challenging and may lead to integration issues. 4. Dependency on Network Connectivity: Grid computing relies heavily on network connectivity; any disruptions or latency in communication can impact performance and task execution.
  翻译: