Chapter - 1: Introduction To Cloud Computing
Chapter - 1: Introduction To Cloud Computing
Chapter - 1: Introduction To Cloud Computing
Advocates note that cloud computing allows companies to avoid or minimize up-front
IT infrastructure costs. As well, third-party clouds enable organizations to focus on their
core businesses instead of expending resources on computer infrastructure and
maintenance. Proponents also claim that cloud computing allows enterprises to get their
applications up and running faster, with improved manageability and less maintenance,
and that it enables IT teams to more rapidly adjust resources to meet fluctuating and
unpredictable business demand. Cloud providers typically use a "pay-as-you-go"
model. This could lead to unexpectedly high charges if administrators are not
familiarized with cloud-pricing models.
1
Cloud Computing
Fig. 1
2
1.1 History
The origin of the term cloud computing is unclear. The word cloud is commonly
used in science to describe a large agglomeration of objects that visually appear from a
distance as a cloud and describes any set of things whose details are not further
inspected in a given context. Another explanation is that the old programs that drew
network schematics surrounded the icons for servers with a circle, and a cluster of
servers in a network diagram had several overlapping circles, which resembled a cloud
.In analogy to the above usage, the word cloud was used as a metaphor for the Internet
and a standardized cloud-like shape was used to denote a network on telephony
schematics. Later it was used to depict the Internet in computer network diagrams. With
this simplification, the implication is that the specifics of how the end points of a
network are connected are not relevant for the purposes of understanding the diagram.
The cloud symbol was used to represent networks of computing equipment in the
original ARPANET by as early as 1977,and the CSNET by 1981—both predecessors
to the Internet itself.
References to "cloud computing" in its modern sense appeared as early as 1996, with
the earliest known mention in a Compaq internal document. The popularization of the
term can be traced to 2006 when Amazon.com introduced its Elastic Compute Cloud.
1970s
During the 1960s, the initial concepts of time-sharing became popularized via
RJE (Remote Job Entry);this terminology was mostly associated with large vendors
such as IBM and DEC. Full time-sharing solutions were available by the early 1970s
on such platforms as Multics (on GE hardware), Cambridge CTSS, and the earliest
UNIX ports (on DEC hardware). Yet, the "data centre" model where users submitted
jobs to operators to run on IBM mainframes was overwhelmingly predominant.
1990s
3
they saw fit to balance server use, they could use overall network bandwidth more
effectively.
2000s
Since 2000, cloud computing has come into existence. In early 2008, NASA's
Open Nebula, enhanced in the RESERVOIR European Commission-funded project,
became the first open-source software for deploying private and hybrid clouds, and for
the federation of clouds.
On March 1, 2011, IBM announced the IBM Smart Cloud framework to support
Smarter Planet. Among the various components of the Smarter Computing foundation,
cloud computing is a critical part. On June 7, 2012, Oracle announced the Oracle Cloud.
In April of 2008, Google released Google App Engine in beta. In May of 2012,
Google Compute Engine was released in preview, before being rolled out into General
Availability in December of 2013.
Similar concepts
4
provides all of its resources as services, and makes use of the well-established standards
and best practices gained in the domain of SOA to allow global and easy access to cloud
services in a standardized way.
Grid computing—"A form of distributed and parallel computing, whereby a 'super and
virtual computer' is composed of a cluster of networked, loosely coupled computers
acting in concert to perform very large tasks.”
5
1.2 Cloud Computing Types
Private cloud
Public cloud
A cloud is called a "public cloud" when the services are rendered over a network
that is open for public use. Public cloud services may be free.[102] Technically there
may be little or no difference between public and private cloud architecture, however,
security consideration may be substantially different for services (applications, storage,
and other resources) that are made available by a service provider for a public audience
and when communication is effected over a non-trusted network.
Hybrid cloud
6
Intercloud
Fig. 1.2.1
7
Architecture
Cloud architecture
Cloud engineering
Fig. 1.2.2
8
Cloud Computing Architecture refers to the components and subcomponents required
for cloud computing. These components typically consist of a front end platform (fat
client, thin client, mobile device), back end platforms (servers, storage), a cloud based
delivery, and a network (internet, intranet, intercloud).
The backend refers to the cloud itself. It consists of all the resources required to provide
cloud computing services. It comprises of huge data storage, virtual machines, security
mechanism, services, deployment models, servers, etc.
9
1.3 Service models
Though service-oriented architecture advocates "everything as a service" (with
the acronyms EaaS or XaaS, or simply aas), cloud-computing providers offer their
"services" according to different models, of which the three standard models per NIST
are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a
Service (SaaS). These models offer increasing abstraction; they are thus often portrayed
as a layers in a stack: infrastructure-, platform- and software-as-a-service, but these
need not be related.
Fig. 1.3.1
10
Infrastructure as a service (IaaS)
According to the Internet Engineering Task Force (IETF), the most basic cloud-
service model is that of providers offering computing infrastructure – virtual machines
and other resources – as a service to subscribers. Infrastructure as a service (IaaS) refers
to online services that provide high-level APIs used to dereference various low-level
details of underlying network infrastructure like physical computing resources,
location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen,
Oracle Virtual Box, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs
the virtual machines as guests.
IaaS-cloud providers supply these resources on-demand from their large pools
of equipment installed in data centers. For wide-area connectivity, customers can use
either the Internet or carrier clouds (dedicated virtual private networks). To deploy their
applications, cloud users install operating-system images and their application software
on the cloud infrastructure. In this model, the cloud user patches and maintains the
operating systems and the application software. Cloud providers typically bill IaaS
services on a utility computing basis: cost reflects the amount of resources allocated
and consumed.
In the software as a service (SaaS) model, users gain access to application software and
databases. Cloud providers manage the infrastructure and platforms that run the
applications. SaaS is sometimes referred to as "on-demand software" and is usually
priced on a pay-per-use basis or using a subscription fee.[85] In the SaaS model, cloud
providers install and operate application software in the cloud and cloud users access
the software from cloud clients. Cloud users do not manage the cloud infrastructure and
platform where the application runs. This eliminates the need to install and run the
application on the cloud user's own computers, which simplifies maintenance and
support.
The pricing model for SaaS applications is typically a monthly or yearly flat fee
per user, so prices become scalable and adjustable if users are added or removed at any
point. Proponents claim that SaaS gives a business the potential to reduce IT operational
costs by outsourcing hardware and software maintenance and support to the cloud
provider. This enables the business to reallocate IT operations costs away from
hardware/software spending and from personnel expenses, towards meeting other
goals. In addition, with applications hosted centrally, updates can be released without
the need for users to install new software.
12
hardware avoiding substantial capital outlays. These security services often include
authentication, anti-virus, anti-malware/spyware, intrusion detection, and security
event management, among others.
Serverless computing
Cloud clients
Users access cloud computing using networked client devices, such as desktop
computers, laptops, tablets and smartphones and any Ethernet-enabled device such as
Home Automation Gadgets. Some of these devices—cloud clients—rely on cloud
computing for all or a majority of their applications so as to be essentially useless
without it. Examples are thin clients and the browser-based Chrome book. Many cloud
13
applications do not require specific software on the client and instead use a web browser
to interact with the cloud application. With Ajax and HTML5 these Web user interfaces
can achieve a similar, or even better, look and feel to native applications. Some cloud
applications, however, support specific client software dedicated to these applications
(e.g., virtual desktop clients and most email clients). Some legacy applications (line of
business applications that until now have been prevalent in thin client computing) are
delivered via a screen-sharing technology.
14
Chapter 2
PROJECT WORK
1.1 AIM & OBJECTIVE
As in the admin part of the cloud computing, we enter the data of a student on
the platform (Salesforce) by the student details (which is created by the organization
or institution which contains the required information). After adding the data of many
students we generate a report by applying some validations and schedule it then select
the user to whom it is going to be send. Then selected user will get a report by email
which contain the information of the selected students
2.2 Platform
Fig. 2.2.1
15
Salesforce.com, is an American cloud computing company headquartered in San
Francisco, California. Though its revenue comes from a customer relationship
management (CRM) product, Salesforce also capitalizes on commercial applications of
social networking through acquisition. As of early 2016, it is one of the most highly
valued American cloud computing companies with a market capitalization above $61
billion. In August 2017, Salesforce announced that it had breached the $10 billion
revenue run rate becoming the first enterprise cloud company to do so.
Overall, it will make Student Information Management an easier job for the
administrator and the student of any organization.
Future Scope
Student information management system will store all the details of the students
including their background information, educational qualifications, personal details and
all the information related to their resume.
16
2.3 Project Snapshots
Fig. 2.3.1
This is the user login page by entering login id and password we enter into the salesforce
platform.
17
Successfully Login
Fig. 2.3.2
This figure shows the successful login of the user into the salesforce platform. There is
a search box in the left side of the page where we can search for the apps, users, objects,
etc. to be built. Already builded apps are also shown on the page.
18
Student Details Form (Clicked)
Shows entered data/forms
Fig. 2.3.3
Object Student Details is shown at the left side of the page by clicking on it we enter
into the page where the data of already registered students is shown along with a ‘new’
button.
19
Student Details form for new data
Fig. 2.3.4
By clicking on ‘new’ button we reach the page where the form appears for entering the
new data into it. We can enter the new data here for any new student.
20
Data enter by user
Fig. 2.3.5
This figure shows the data of new student enter by the users. Fields are shown along
with the description of the field. Like first name, last name, roll no., email, etc.
21
Information Saved
Fig. 2.3.6
After entering the data of the student save button is clicked and the saved information
of the student is shown in this figure. Here the data of the student named Priyanka is
shown.
22
Creating Report
Fig. 2.3.7
Now for creating report we need to click on ‘+’ icon on the left –top side of the page
by clicking on the new tab (‘+’) icon we reach the page shown in the figure. In the tabs
shown in the page click on ‘Report icon’ for creating report.
23
New Report Button and List of existing report
Fig. 2.3.8
By clicking on the ‘Report icon’ we enter the page where there is a button for creating
new report and the list of already existing report is also shown below. New report button
is clicked for creating new report.
24
Select object for report
Fig. 2.3.9
By clicking on the new report button a page get opened where we see all the objects.
Choose the required object on which we wish to create a report from the existing
objects.
25
Report Menu
Fig. 2.3.10
Report Menu page is shown in the figure. Here we can see the data of all the registered
students. Along with the column shown on the left side of the page where all the fields
are shown.
26
Applying Validation
Fig. 2.3.11
If we wish to generate the generic report for all the students then just click on ‘Run
Report’ button visible on the page. But if we wish to create a report of some specific
students then we need to apply a validation. As shown in figure a validation is applied
“ student branch equals me”. This means that students belonging to mechanical
branch are only selected students.
27
Validation Applied
Fig. 2.3.12
After specifying a validation rule click on ‘OK’ button so that validation can be
applied. Now we can see only those students who had opt mechanical branch.
28
Drag and Drop required fields
Fig. 2.3.13
On the left side of the page a column is appearing where we can see all the fields of the
student details form. Such as first name, last name, roll no., email address, etc.
29
Run Report
Fig. 2.3.14
After applying validation and dropping the required field now we run the report by
clicking on run report button , a broke down list appears as shown in the figure
containing two rows –‘Run Report Now’ and ‘ Schedule Future Run’.
30
Information for Schedule Run
Fig. 2.3.15
We can run report in two ways by clicking on run report now or by scheduling report
for future run. Figure shows the schedule of the report for future run.
31
Select start date, end date, time for schedule run
Fig. 2.3.16
Now schedule is made for the report by filling the required column shown in the figure.
Select start date, end date, start time for making the schedule of the report. Also select
the email criteria for sending mail either to you or to another user.
32
Saving Report Schedule
Fig. 2.3.17
After doing all the task the last task is to save the schedule of the report which we wish
to run in future. After saving the schedule for future run a mail is sent to the user
containing the report of the students having mechanical branch.
33
Report via Mail
Fig. 2.3.18
34
Chapter 3
The above report via mail is the result of the student management system. Student
information management system lead to a better organization structure since the
information management of the students is well structured and also lead to better as
well as efficient utilization of resources.
35
Chapter 4
36