Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Implementation and overview of cloud computing

Rating
-
Sold
-
Pages
6
Uploaded on
06-04-2024
Written in
2023/2024

Cloud computing refers to the delivery of computing services over the internet, allowing individuals and organizations to access and utilize a variety of resources, such as servers, storage, databases, networking, software, and more, without the need for owning or managing physical infrastructure.

Show more Read less
Institution
Course

Content preview

Experiment No.2
Aim: - Implementation and Overview of Cloud Computing.
Theory: - 1. What is Cloud Computing?
Cloud computing refers to the delivery of computing services over the internet, allowing
individuals and organizations to access and utilize a variety of resources, such as servers, storage,
databases, networking, software, and more, without the need for owning or managing physical
infrastructure. These services are typically provided by cloud service providers, who maintain
large data centers housing the necessary hardware and software.



2. Architecture of Cloud Computing: -



Client Infrastructure



Internet




Application
M S
A E
N Service C
A U
G Cloud Runtime R
E I
M T
Storage
E Y
N
Infrastructure
T

, The architecture of cloud computing encompasses various components and layers that work
together to deliver cloud services to users. Here's a simplified overview of the typical
architecture:

1) Client Infrastructure: These are the devices used by end-users to access cloud services,
such as desktop computers, laptops, tablets, smartphones, IoT devices, etc. Users interact with
cloud services through web browsers, mobile apps, or other client applications.

2) Internet: The internet serves as the medium through which client devices connect to cloud
services hosted in data centers. It provides the necessary network connectivity and protocols for
data transmission.

3) Application Layer: This layer represents the software applications and services that users
interact with directly. It includes everything from web-based email services to complex business
applications. These applications are typically accessed through web browsers or specialized client
software.

4) Service Layer: The service layer provides the middleware and runtime environments
necessary for building, deploying, and managing applications. It includes various platform
services such as databases, messaging queues, caching services, and development frameworks.

5) Cloud Runtime Layer: This layer hosts and manages the execution of applications and
services. It includes the virtualized servers, containers, and serverless computing environments
where applications run. Cloud service providers manage the underlying infrastructure, ensuring
availability, scalability, and performance.

6) Storage Layer: The storage layer provides scalable and durable storage solutions for data
persistence and retrieval. It includes various types of storage services such as object storage,
block storage, and file storage. These services offer features like high availability, durability, and
data replication.

7) Infrastructure Layer: This layer comprises the physical and virtual infrastructure resources
that support the cloud environment. It includes data centers, servers, networking equipment,
and virtualization technologies. Cloud providers manage this layer, ensuring resource
provisioning, monitoring, and maintenance.

8) Monitoring and Management: Cloud providers offer tools and services for monitoring
and managing cloud resources, performance, and costs. These tools allow users to monitor
resource utilization, troubleshoot issues, optimize performance, and control costs effectively.

9) Security: Cloud architectures incorporate various security measures to protect data,
applications, and infrastructure from unauthorized access, data breaches, and other security
threats. These measures include encryption, identity and access management (IAM), firewalls,
intrusion detection/prevention systems (IDS/IPS), and compliance certifications.

Written for

Course

Document information

Uploaded on
April 6, 2024
Number of pages
6
Written in
2023/2024
Type
Class notes
Professor(s)
Bhavna sharma
Contains
All classes

Subjects

$11.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
rutikapatel

Get to know the seller

Seller avatar
rutikapatel Self
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
4
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions