Cloud Computing: Technology and its Mechanisms Report

Verified

Added on  2023/01/13

|19
|916
|84
Report
AI Summary
This report provides a comprehensive overview of cloud computing, detailing its infrastructure, logical network perimeters, and virtual servers. It explores cloud storage devices, levels, and technical interfaces, along with cloud usage monitor mechanisms, including monitoring, resource, and polling agents. The report also covers resource replication and ready-made environments, such as Platform-as-a-Service (PaaS). A case study of DTGOV organization highlights the practical application of these concepts, including the use of routers, DMZ zones, and firewalls. The report emphasizes the virtualization of cloud storage devices and their pay-per-use mechanisms. It concludes with references to relevant research papers and resources.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cloud Computing
An disruptive technology in the field of
computer technology
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
student name and number 2
Content
Cloud Infrastructure
Logical Network perimeter
Case study (DTGOV)
Virtual servers
Cloud storage devices mechanism
Cloud storage levels
Technical interfaces to storage
Cloud usage monitor mechanism
Monitoring agent, resource agent, polling agent
Resource replication and ready-made environment
Document Page
student name and number 3
Cloud infrastructure mechanism
Cloud infrastructure is a foundation of
building blocks of different environments,
such as logical network perimeter, cloud
usage monitor, read-made environment,
virtual servers, resources replication, and
cloud storage devices (Schouten, 2014).
Document Page
student name and number 4
Logical network perimeter
It is a isolated network environment that is
establishing a virtual network boundaries
Different purposes of logical network
1. it isolate IT resources from non-user in a
cloud
2. it isolate IT resources from non-authorize
users in a cloud (Dinh, Lee, Niyato, & Wang,
2013).
3. it isolate IT resources, such as bandwidth
for cloud consumers.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
student name and number 5
Logical network perimeter (2)
Document Page
student name and number 6
Case study (DTGOV)
There are some critical requirements of
DTGOV organization to manage their
resources in proper way, which are as:
Routers for connecting extranet to internet
DMZ zone for creating virtual network
hosting for proxy servers of company (Garg,
Versteeg, & Buyya, 2013).
Firewalls to provide monitoring, controlling,
isolation of traffic, and filter network traffic.
Document Page
student name and number 7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
student name and number 8
Victual Servers
Virtual servers provide virtualization to
emulates a physical server s issues
It is used to resource sharing by cloud
providers (Krutz, & Vines, 2010).
Document Page
student name and number 9
Victual Servers (2)
Document Page
student name and number 10
Cloud Storage Devices Mechanism
Cloud base environment are having specific
storage devices (Mahalle, Yong, Tao, & Shen,
2018).
These devices have facility to be virtualized
it has pay-per-use mechanism in which user
can pay and get fix-increment capacity in his
storage (Rittinghouse, & Ransome, 2016).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
student name and number 11
Cloud storage level
Files
Blocks
Datasets
Objects
Document Page
student name and number 12
Technical Interfaces to Storage
Network storage interface
Object storage interface
Database storage interface
1. relational data storage
2. Non-relational data storage
Document Page
student name and number 13
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
student name and number 14
Cloud Usage Monitor Mechanism
Cloud computing has a software to manage
the processing and usages of IT resources
It maintain a record in metric, such as usage
time, amount of data, and many others
Document Page
student name and number 15
Format of agents
Monitoring agent – it measure network traffic
and analysing data flows
Resource agent – it manages IT resources,
such as initiating, vertical scaling, resuming
services
Polling agent – it monitor uptime and
downtime of IT resources (Sen, 2014).
Document Page
student name and number 16
Resource replication and ready-made
environment
It is a concept that makes multiple instances
of the same IT resources
Platform-as-a-Service (PaaS)- it is a platform
that have all the IT resources, which are
required by the user, such as software
development kit (Zhang, Wuwong, Li, &
Zhang, 2010).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
student name and number 17
Document Page
student name and number 18
References
Schouten, E. (2014). Cloud computing defined: Characteristics & service levels.
Retrieved September 11, 2018, from
https://www.ibm.com/blogs/cloud-computing/2014/01/31/cloud-computing-defined-
characteristics-service-levels/
Dinh, H., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), 1587-1611.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud
computing services. Future Generation Computer Systems, 29(4), 1012-1023.
Krutz, R., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure
cloud computing. . London: Wiley Publishing.
Mahalle, A., Yong, J., Tao, X., & Shen, J. (2018). Data Privacy and System Security for
Banking and Financial Services Industry based on Cloud Computing Infrastructure.
IEEE Explore, 407-413.
Rittinghouse, J., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. . Florida: CRC press.
Sen, J. (2014). Security and privacy issues in cloud computing. In J. Sen, In
Architectures and protocols for secure information technology infrastructures (pp. 1-
45). USA: IGI Global.
Zhang, X., Wuwong, N., Li, H., & Zhang, X. (2010). Information security risk
management framework for the cloud computing environments. In Computer and
Information Technology (CIT) (pp. 1328-1334). IEEE.
Document Page
student name and number 19
Any Question ???
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]