ASSIGNMENT 1 FRONT SHEET
Qualification
BTEC Level 5 HND Diploma in Computing
Unit number and title
Unit 16: Cloud computing
Submission date
28/07/2022
Date Received 1st submission
Re-submission Date
Date Received 2nd submission
Student Name
Nguyen Huy Hoang
Student ID
GCH200739
Class
GCH0908
Assessor name
Do Quoc Binh
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1
P2
P3
P4
M1
Page 1 of 39
M2
D1
Summative Feedback:
Grade:
Resubmission Feedback:
Assessor Signature:
Date:
Internal Verifier’s Comments:
Signature & Date:
Page 2 of 39
Table of Contents
INTRODUCTION ..................................................................................................................................................... 5
I.
CLOUD COMPUTING ...................................................................................................................................... 6
II.
CLIENT – SERVER ............................................................................................................................................ 7
a)
Client ........................................................................................................................................................... 7
b) Server .......................................................................................................................................................... 8
c)
Advantages and Disadvantages Of the Client-Server model ..................................................................... 8
d) Examples of the Client-Server model: ........................................................................................................ 9
III.
a)
PEER-TO-PEER ............................................................................................................................................. 9
Advantages and Disadvantages of P2P .................................................................................................... 10
b) Examples of P2P: ...................................................................................................................................... 10
IV.
a)
HIGH-PERFORMANCE COMPUTING ......................................................................................................... 11
Parallel ...................................................................................................................................................... 11
b) Cluster....................................................................................................................................................... 12
c)
Distributed ................................................................................................................................................ 12
d) Example .................................................................................................................................................... 13
V.
DEPLOYMENT MODELS ................................................................................................................................ 13
a)
Public Model ............................................................................................................................................. 14
b) Private Model ........................................................................................................................................... 15
c)
Community Model .................................................................................................................................... 16
d) Hybrid Model ............................................................................................................................................ 18
VI.
a)
CLOUD SERVICE MODELS ......................................................................................................................... 19
Saas (Software As A Service) .................................................................................................................... 19
b) Paas (Platform As A Service)..................................................................................................................... 20
c)
Laas (Infrastructure As A Service)............................................................................................................. 21
d) Comparing Cloud Service Models: ........................................................................................................... 23
VII.
CHARACTERISTICS OF CLOUD ................................................................................................................... 24
VIII.
VIRTUALIZATION AND MULTICORE .......................................................................................................... 25
IX.
SOLUTION FOR ATN .................................................................................................................................. 26
a)
Review ATN scenario ................................................................................................................................ 26
Page 3 of 39
b) Discuss the Solution for ATN and Why ATN Should Use Cloud ................................................................ 26
c)
Deployment Model................................................................................................................................... 28
d) Service Model ........................................................................................................................................... 28
e)
Technical Stack Solution for ATN and Justify The Tools Chosen To Realise A Cloud Computing Solution
29
X.
Cloud Architecture ....................................................................................................................................... 31
XI.
DISCUSS WHY AN ORGANISATION SHOULD MIGRATE TO A CLOUD COMPUTING SOLUTION(M1) ........ 32
XII.
DEMONSTRATE THESE DEPLOYMENT MODELS WITH REAL WORLD EXAMPLES(M2) ............................ 35
CONCLUSION ....................................................................................................................................................... 38
References ........................................................................................................................................................... 38
List of Figures
Figure 1: Cloud Computing ................................................................................................................................................... 6
Figure 2: Client - Server......................................................................................................................................................... 7
Figure 3: Peer to peer architechture................................................................................................................................... 10
Figure 4: P2P example......................................................................................................................................................... 11
Figure 5: Public Cloud ......................................................................................................................................................... 14
Figure 6: AWS - Real world example of Public Cloud..............................................................Error! Bookmark not defined.
Figure 7: Private Cloud ........................................................................................................................................................ 15
Figure 8: Cisco Private Cloud...................................................................................................Error! Bookmark not defined.
Figure 9: Community Cloud ................................................................................................................................................ 17
Figure 10: HPE Community Cloud ...........................................................................................Error! Bookmark not defined.
Figure 11: Hybrid Model ..................................................................................................................................................... 18
Figure 12: Fujitsu Cloud ..........................................................................................................Error! Bookmark not defined.
Figure 13: Cloud Service Models......................................................................................................................................... 19
Figure 14: Saas .................................................................................................................................................................... 20
Figure 15: Paas .................................................................................................................................................................... 21
Figure 16: IaaS ..................................................................................................................................................................... 22
Figure 17: Comparing Service models ................................................................................................................................ 23
Figure 18: Virtualization and Multicore .............................................................................................................................. 25
Page 4 of 39
INTRODUCTION
Teenagers in several areas around Vietnam may purchase toys from a Vietnamese firm called ATN. Over
$700,000 per year is the company's annual revenue. Typically, per store has a separate database to keep
proper books of accounts specific to that store. In this assignment, I need to develop a solution to satisfy the
demands of the ATN business, which include offering a method of data storage from participant shops for
directors and Major shareholders to quickly and effectively research and extract in order to be able to update
stock information in real time.
First, a brief introduction of cloud computing, including its evolution and foundational ideas. Then, a cloud
computing framework with an appropriate architectural design for ATN. Cloud computing should be used for
analysis and assessment of business reasons. Analyze and choose the best deployment strategy for ATN. To
choose a model that works for the organization, compare service offerings. Examples in real life of the
aforementioned deployment models.
Page 5 of 39
I. CLOUD COMPUTING
The term "cloud computing" refers to a system or service that combines the features and capabilities of
the cloud with computing. A cloud may be characterized as a wide-area network community that includes
data centres and the software and hardware applications that go with them, along with other Information
Technology (IT) resources and infrastructures that are accessible via internet connectivity. It was further
envisaged as an innovative IT environment primarily created for the remote delivery of common and
scalable IT resources (Kamal Kant Hiran, Ruchi Doshi, Temitayo Fagbola, Mehul Mahrishi, 2019).
Figure 1: Cloud Computing
Directly in opposition, the technique of utilizing computer technology to accomplish a specific goal-oriented
issue is characterized as computing by Technopedia. It can also signify the procedure of acquiring,
processing, and arranging data using computer hardware, software, and/or computer systems for a variety
of reasons.
Examples of Cloud Computing:
With the debut of Amazon Web Services (AWS) in 2006, Amazon was able to successfully implement the
potential of their infrastructure by the early 2000s provide and its patrons with enhanced online services.
Take Amazon Fluid mechanics Turk (MTurk) and Amazon Elastic Compute Cloud as examples (Amazon EC2).
The Google Docs services also debuted in 2006. With the service of this application system, online word
processing services were made publicly available, supporting editing and record retention. While Apple
Page 6 of 39
released the ICloud platform in 2008, IBM created and released the IBM SmartCloud framework (Hiran,
2016).
Oracle Corporation introduced Oracle Cloud in 2012 purpose of providing Infrastructure-as-a-Service (IaaS),
Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) (IaaS). That's because the cloud has gained
sufficient maturity in 2014, the amount of efforts have been made to improving its authentication methods.
Use of the cloud computing is currently quite commonplace. S pecially created techniques to produce the
desired performance of an organization need.
II. CLIENT – SERVER
A distributed application structure known as the client-server paradigm divides tasks or workloads between
service providers, also known as servers, and clients, who are the people who are asking for the resource
Figure 2: Client - Server
or service. When a client computer sends a request for data to a server via the internet, the server receives
the request, processes it, and delivers the desired data packets back to the client. This is known as a clientserver architecture (Contributor, n.d.).
a) Client
Clients, often referred to as service requesters, are components of server software or hardware
that make requests for resources and services that a server makes available. Three categories
of client computing:
Thick Client: A client that offers a lot of capability, does much of the data processing on
its own, and depends very little on the server.
Page 7 of 39
Thin Client: An application server handles the majority of the necessary data processing
for a thin-client server, which is a lightweight computer that heavily relies on the
resources of the host computer.
Hybrid Client: A hybrid client combines the traits of a thin client and a thick client,
depending on the server to store permanent data while yet having local processing
power.
b) Server
An object or computer program that serves as a hub for other objects or programs is known as
a server. A server is any computerized system that a client may access or utilize to share
resources and distribute tasks. Typical servers include the following:
Users on the network can access web applications hosted by the application server
without having to download a copy themselves.
Computing Server: Shares a significant portion of the CPU and RAM needed by
networked computers, which is more than a regular personal computer can provide.
Any computer application that consumes well-organized data, such as spreadsheets and
accounting software, requires a database server to manage and exchange databases.
The World Wide Web is made possible by online servers, which host web pages.
c) Advantages and Disadvantages Of the Client-Server model
Benefits of the client-server model:
A centralized database containing all information in one location.
Cost-effective requires minimal upkeep, and data recovery is feasible.
Both the Client and Server capacities are independently modifiable.
Negative aspects of the client-server model:
Viruses, Trojan horses, and worms can infect clients if they are on the server or uploaded
to it.
Denial of Service (DOS) assaults frequently target servers.
During transmission, data packets can be tampered with or altered.
Page 8 of 39
MITM (Man in the Middle) assaults and phishing are both widespread, as attempts to
capture login passwords or other crucial user information.
d) Examples of the Client-Server model:
Using a computer and input www.google.com into the browser (e.g. CocCoc). Consequently,
you're utilizing the client’s PC. The Google web server is now contacted by the browser.
When the browser requests anything from the Google web server, the browser shows that
request with the associated data, i.e., the Google website. The browser will once more
submit a request to the Google website to display search results if you search using their
search engine. File servers: These are where all of the files are stored in one place. For
instance, your devices will be able to access Google Docs and Microsoft Office online
services, as well as anything that you save to your computer and your phone. File shops will
be centrally located and accessible to many clients in this fashion.
Similar to how your smartphone acts as a client when making a phone call, a mobile tower
or mobile exchange acts as a server when you make a call from your smartphone. The mobile
exchange will handle the call processing and connect you to the intended recipient.
Customers and banks are yet another instance of a client-server. All of the customer's data
is stored on web servers owned by a bank. As a client now, the customer can request a
balance enquiry via his computer to the bank website. Data from the bank web server is
fetched by the bank website in order to show client information.
III. PEER-TO-PEER
Page 9 of 39
Peer-to-peer networks are a type of distributed network design where members contribute some of their
own hardware resources (processing power, storage capacity, netWork: link capacity, printers). To deliver
the Service and content made available by the network, several shared resources are required (e.g. file
sharing or shared workspaces for collaboration) (Xuemin Shen, Heather Yu, 2017).
Peer-to-peer systems are distributed systems made up of interconnected nodes that can self-organize into
Figure 3: Peer to peer architechture
network topologies to share resources like content, CPU cycles, storage, and bandwidth. They are also able
to adapt to failures and accommodate transient populations of nodes while maintaining acceptable
connectivity and performance, without needing the assistance of a global centralized server or authority.
a) Advantages and Disadvantages of P2P
No requirement to purchase a pricey server.
There is no requirement for a network manager because each user is in charge of their own
machine.
Due to the setup being handled by software wizards, users do not need any technical expertise.
Both families and small enterprises can set up a P2P network. However, it is necessary to
maintain each computer separately.
network activity is lower than in a client/server network.
b) Examples of P2P:
Page 10 of 39
A well-known P2P network is torrent. Every machine involved in torrenting is linked to one
another through the internet. Any network file can be uploaded by one computer, and
subsequent computer connections will begin downloading the content. Every machine can also
upload a portion of the file if it has previously downloaded a portion of it.
With an estimated 300 million users globally, cryptocurrencies are an asset that is rapidly
growing in popularity. With a peer-to-peer (P2P) transaction architecture that does away with
the need for a central middleman like a bank or broker, Bitcoin, the most well-known
cryptocurrency, was developed to allow users to trade value anonymously and directly. This
peer-to-peer (P2P) architecture served as the basis for the peer-to-peer (P2P) blockchain
technology that underpins Bitcoin and all other cryptocurrencies.
Figure 4: P2P example
IV. HIGH-PERFORMANCE COMPUTING
High-Performance Computing (HPC) is the process of pooling computing capacity to provide substantially
more processing power than conventional computers and servers. Supercomputing, often known as HPC,
is just powerful computing. It is a technique for quickly processing enormous amounts of data utilizing a
network of computers and storage devices. HPC makes it feasible to investigate and discover solutions to
some of the largest issues in business, engineering, and research.
a) Parallel
By dividing bigger issues into smaller, independent, frequently related components that may be
processed concurrently by a number of processors connected by shared memory, parallel computing
refers to the process. The completed results are then integrated as a component of a larger algorithm.
The main objective of parallel computing is to boost the amount of computing power that is available
for quicker application processing and issue resolution.
Page 11 of 39
b) Cluster
A fast interconnect connects a number of distinct servers (computers), known as nodes, to form an HPC
cluster.
The client-server approach is distinct from this since it calls for one or more servers, but with cluster
computing, several computers use a single operating system to provide a stable computing
environment (Allen, n.d.).
Thus, by offering a solution to a problem with additional processing capacity, HPC clusters provide
parallel computing.
Example of Cluser Cloud Computing:
An open-source platform called Kubernetes optimizes the deployment, scaling, and monitoring of
virtualized environments (Nordhoff, 2020). A set of Kubernetes-managed nodes running containerized
apps is thought to as a cluster. It consist of two sets of nodes: worker nodes, which handle one or more
applications, and the control plane, which is made up of a number of nodes (akin to the leader node(s)
in a generic cluster).
Kubernetes is a sophisticated software that makes it simpler to deploy systems to cluster, generates
more "pods" (groups of one or more containers) as traffic develops, consciousness faulty pods,
dynamically replies to networking changes, load adjusts, enforces security rules, also does a lot more.
It is built with endurance, robustness, and performance in mind, natively utilizing cluster architecture's
advantages.
c) Distributed
Because they can offer the following distinguishing characteristics, distributed computing systems are
preferable to centralized ones.
Scalability: This refers to the system's capacity to be quickly extended by adding more computers
as necessary, and vice versa, without compromising the current configuration.
Redundancy or replication: In this case, many computers can offer the same services, meaning that
even if one is unavailable (or fails), work will still be able to continue thanks to the availability of
other computing resources (Boyd, 2018).
Example of Distributed Cloud Computing:
Fog computing and edge computing are two examples of distributed clouds. By generating a
distributed cloud, computation is placed nearer to the customers, resulting in lower latency and thus
more prospects for security. A blockchain-based security architecture or stochastic assessment of data
Page 12 of 39
to guarantee for accuracy are potential security solutions. Real-time data processing is also done via a
distributed cloud.
Distributed Edge computing enables intelligent construction equipment to function independently of
a sizable central data centre or cloud. Utilizing the edge for on-site data management reduces the
amount of data infrastructure required and results in fewer disruptions.
d) Example
This is advancing the performance and flexibility necessary to execute sophisticated HPC workloads in
the cloud along with cloud providers and our other HPC partners. To enable cloud providers to deliver
fast, secure, and agile environments employing our newest technologies, such as Intel® Xeon® CPUs,
we cooperate throughout our HPC ecosystem.
It’s been committed to assisting cloud clients as they pursue novel HPC applications and possibilities. In
order to support cutting-edge cloud use cases like bursting, AI, and advanced analytics, collaborating
with HPC partners from a variety of sectors.
V. DEPLOYMENT MODELS
Page 13 of 39
Based on ownership, scale, access, and the nature and purpose of the cloud, the cloud deployment model
pinpoints the precise sort of cloud environment. A cloud deployment model specifies the location and
ownership of the servers you're using. The forms of cloud deployment also determine the connections
between your users and the infrastructure (delwal, n.d.).
Here are 4 most popular models:
a) Public Model
The name says it all: public clouds are accessible to the entire public, and data are generated and
stored on servers owned and operated by other parties.
Figure 5: Public Cloud
There is no need for user organizations to purchase and maintain their own hardware because
service providers on the server infrastructure manage and administer pool resources. On the
Internet, provider businesses provide resources as a service for free or on a pay-per-use basis. Users
can adjust resource scaling as needed (Shaptunova, n.d.).
Advantages and Disadvantages:
Advantages
Disadvantages
☺
Hassle-free infrastructure management Compromised reliability
☺
High scalability
☺
Reduced costs
☺
24/7 uptime
Data security and privacy issues give rise
to concern
The lack of a bespoke service
Table 1: Pros & Cons of the Public model
Page 14 of 39
Examples:
Amazon Web Service, one of the first Public Cloud providers, is a significant supplier in the
cloud computing business (AWS).
The Amazon Elastic Compute Cloud, or E2C, is the company's top computing offering. The
service can be less expensive than other services due to its interoperability with the great
majority of other Amazon Web Services. It is also quite configurable.
More specific, when applying the public model, The example shops will have two options for
pushing data to the cloud component designated by the system. The first method is to utilize
the built-in web interface to do data actions (add, modify, remove, view) directly using the
given ID shop. In the event that the website fails or there is a network connection error, the
shop can use the second method, which is to push the data into the Primary App to perform
the same tasks as when using the web, and when connected properly, the Primary App will
work to automatically push all data entered offline through the provided ID shop. The data
from the stores will be managed on the accessible cloud partition from here.
b) Private Model
The technological distinction between a public and private model is minimal to nonexistent because
of how similar their structures are. Private clouds, on the other hand, are owned by only one unique
Figure 6: Private Cloud
business, as opposed to public clouds, which are accessible to everyone. It often goes by the names
internal model or corporate model for this reason.
Page 15 of 39
The server may be housed on or off-site by the owning firm. These infrastructures, regardless of
where they are physically located, are maintained on a specific private network and contain
hardware and software that are only meant to be used by the owning firm.
The private cloud not only helps the corporation to keep everything isolated from the outside world,
but it also allows system administrators to better govern the whole system. When compared to
Public Deployment, one advantage is that it does not rely on a third-party stakeholder. By controlling
the entire system, the corporation gains more security while decreasing the size of the cloud.
And from there, they will generate critical data in order to analyze the status quo and prepare for
the future (this is also one of the most critical and secret data requirements). After these critical data
are established, administrators can add, update, delete, and view them on the Important Data
Server. This will be a high-security location since it includes a lot of secret and vital data for the firm.
Advantages & Disadvantages:
Advantages
☺
Disadvantages
Bespoke and flexible development and The major disadvantage of the private
high scalability
☺
cloud deployment model is its cost
High security, privacy and reliability
Table 2: Pros & Cons of the Private model
Example:
Cisco Private Cloud service:
With its private cloud solutions, Cisco, a top supplier of business technology, can easily
integrate them with the rest of its product line. Cisco is in a good position to be a long-term
partner for businesses starting their digital transformation path, including and beyond private
cloud hosting options.
c) Community Model
Page 16 of 39
The main distinction between a community deployment approach and a private deployment
methodology is the user base. While a community cloud's architecture and associated resources are
shared by a number of businesses with relevant backgrounds, a private cloud server is owned only
by one corporation.
Figure 7: Community Cloud
This multi-tenant data centre design enables these businesses to increase their productivity, as in
the case of collaborative projects, if all the participating enterprises meet consistent security,
privacy, and performance criteria.
Advantages and Disadvantages:
Advantages
Disadvantages
☺
Cost reduction
High cost compared to the public
☺
Improved security, privacy and reliability
☺
Ease of data sharing and collaboration
deployment model
Sharing
of
fixed
storage
and
bandwidth capacity
Not commonly used yet
Table 3: Pros & Cons of the Community model
Examples:
Hewlett Packard Enterprise (HPE):
GreenLake, HPE's leading cloud product, is well known. HPE GreenLake has been used in
community cloud use cases and is designed for private and hybrid cloud solutions. In addition
to GreenLake, HPE uses its Helion suite of open-source software and integrated technologies to
create on-premise private clouds and community cloud architectures.
Page 17 of 39
For your particular industry's demands, HPE customizes its community cloud offerings, providing
crucial services like big data processing and mobility. It also helps that HPE offers a
comprehensive range of cloud services, including edge management colocation, data centers,
and cloud application development.
d) Hybrid Model
A hybrid cloud combines the greatest aspects of the aforementioned deployment patterns, as is
typically the case with any hybrid phenomena (public, private and community). In order to best meet
client needs, it enables businesses to combine and contrast the characteristics of the three
categories.
Figure 8: Hybrid Model
Using a secure private cloud for mission-critical tasks and a public cloud for less sensitive ones, for
instance, can help a business balance its burden.
The community cloud is not utilized by "completely distinct enterprises" because information and
traffic are shared (and used) in the same way. It means that there are always commonalities across
firms that employ this type of deployment (or in a group of companies).
Advantages:
☺
Improved security and privacy
☺
Enhanced scalability and flexibility
☺
Reasonable price
Examples:
Page 18 of 39
A hybrid cloud was recognized as a means to expand its customer base and enhance income
by the well-known Japanese company Fujitsu (Bruce, n.d.).
With the aid of NetApp Private Storage for Microsoft Azure, the company is able to provide
a superior cloud solution with greater flexibility and control.
The company's internal system integration engineering teams were being supported in their
development efforts through the implementation of this new service.
VI. CLOUD SERVICE MODELS
The foundational concepts for cloud computing are cloud service models (Rastogi, 2021).
These are several methods to explain how you can use the cloud for your company. These models, which
are stacked in a pyramid shape, may be divided into three types:
Figure 9: Cloud Service Models
SaaS (software as a service)
PaaS (platform as a service)
laaS (infrastructure as a service)
These three concepts provide the foundation for the variety of services provided by cloud computing.
There are several advantages to each cloud computing paradigm. Different sorts of enterprises can use
these models. Knowing the benefits and drawbacks of each model can help you decide if it is right for
your company.
a) Saas (Software As A Service)
Page 19 of 39
Software as a Service provides web-based solutions that are controlled by the software supplier
rather than by your business.
Figure 10: Saas
Your company will no longer be under the continual strain of managing software updates, network
security, infrastructure, data availability, and all the other operational concerns related to keeping
applications up and running.
Common SaaS Use-Case: Dispenses with conventional on-device software. Customer relationship
management, video conferencing, email, collaboration, and other situations are just a few examples
of the many different types there exist. SaaS services provide direct delivery of application-level
functionality to the end user with minimal demand on IT support resources that are largely focused
on compliance monitoring at the application layer.
Examples of SaaS: Microsoft Office 365, Oracle ERP/HCM Cloud, SalesForce, Gmail, or Dropbox.
b) Paas (Platform As A Service)
With the help of a ready-to-use development environment provided by PaaS, developers can focus
on creating and executing high-quality code to create unique apps.
Page 20 of 39
Without having to manage the underlying infrastructure, it makes it easier to construct applications
fast. You don't need to install an operating system, a web server, or even system upgrades when
utilizing PaaS to launch a web application, for instance. You may, however, expand your services
and include additional features (Kumar, 2021).
Figure 11: Paas
The process of creating and deploying applications is simplified by this cloud service paradigm,
which is more expensive than IaaS but less expensive than SaaS.
Advantages:
☺
Faster development time
☺
Reduced costs
☺
Enhanced security
☺
High availability
Example: WebApps, Functions, or Azure SQL DB from Azure; Cloud SQL DB from Google Cloud;
Elastic Beanstalk or Lambda from AWS; Oracle Database Cloud Service from Oracle Cloud; or Cloud
SQL DB or WebApps from Azure.
c) Laas (Infrastructure As A Service)
Page 21 of 39
It is the most adaptable kind of cloud service, allowing you to rent hardware and including the
fundamental IT and cloud building blocks. Complete control over the hardware that powers your
program is provided by it (servers, VMs, storage, networks & operating systems).
Figure 12: IaaS
It is an immediate computer infrastructure that is provisioned and controlled online. The highest
level of flexibility and administrative control over your IT resources is provided by IaaS. It is most
reminiscent of the common IT resources that many IT organizations and developers are accustomed
to.
Advantages of Iaas:
☺
Cost savings
☺
On-demand access
☺
Flexibility
Examples of IaaS: Virtual Machines or AWS EC2, Storage or Networking, IBM SoftLayer, Virtustream,
Akamai
Page 22 of 39
d) Comparing Cloud Service Models:
Figure 13: Comparing Service models
Customer's
SaaS
PaaS
IaaS
People, Data
People, Data,
People, Data,
Applications
Applications, Runtime,
responsibility
Middleware, Operating
System, Virtual Network
CSP responsibility
The
typical
level
Applications, Runtime,
Runtime, Middleware,
Hypervisor, Servers,
Middleware, Operating
Operating System,
Storage, Physical
System, Virtual Network,
Virtual Network,
Network
Hypervisor, Servers,
Hypervisor, Servers,
Storage, Physical
Storage, Physical
Network (Interior, n.d.)
Network
of Usage and usage-related
control granted to could
Limited administrative
configuration.
consumer
Page 23 of 39
Full administrative
User Activities
Benefit
Configure cloud
Test, develop, manage
Test, develop, manage
service
and deploy cloud-based
and deploy cloud-based
solutions and cloud
solutions and cloud
services.
services.
Reduced dangers as a
Simple to deploy
Due to the lack of
result of free resources
version. Possibility of
hardware and labour
and software.
integrating online
costs, risks are reduced.
Allows providers to
services from many
Scale change.
manage and restrict the
sources.
Automation.
number of users. Stop
Costs (for mistake
copying and sharing.
correction, security
The ability to centralize
integration, etc.) should
upgrades makes it easier
be reduced.
to avoid loading patches
Application
and updates.
development for many
users.
Table 4: Comparing Cloud Service Models
VII. CHARACTERISTICS OF CLOUD
Following are the characteristics of Cloud Computing:
Resources Pooling: It indicates that the cloud service provider used a multi-tenant approach to pool
computer resources to serve as many clients as possible. Depending on the needs of the client,
various physical and virtual resources are assigned and redistributed.
On-Demand Self-Service: The user may regularly check the server uptime, capabilities, and allotted
network storage, making it one of the crucial and beneficial aspects of cloud computing. The user
may keep tabs on the computer's capabilities with the help of this function (Mahali, 2022).
Page 24 of 39
Rapid Elasticity: IT resources for the computing services should be scalable out and in rapidly as
needed. When a user requests a service, it is delivered to him, and when his need is met, it is scaled
out.
Measured Service: Each program and occupant's resource usage is monitored, giving both the user
and the resource supplier a record of what has been consumed. This is done for a variety of
purposes, including effective resource management and billing oversight.
Security: One of the most beneficial aspects of cloud computing is cloud security. It takes a snapshot
of the data so that even if one of the servers malfunctions, the data won't be lost.
The storage devices where the data is kept are impenetrable to hacking attempts and other users.
The storage service is efficient and dependable.
VIII.
VIRTUALIZATION AND MULTICORE
The use of virtualization and multicore processing in software development is quickly spreading
throughout the industry. They are widely used in the business world, particularly in large data centres
that support cloud-based computing, to isolate application software from hardware and operating
systems (FIRESMITH, 2017).
Figure 14: Virtualization and Multicore
Reduce hardware costs by allowing different applications to share underutilized computers or
processors; improve reliability and robustness by limiting fault and failure propagation and support
failover and recovery; and enhance scalability and responsiveness through the use of To accomplish
Page 25 of 39