SlideShare a Scribd company logo
1 of 16
Download to read offline
CORE COURSE VIII
CLOUD COMPUTING Credit: 5
UNIT -1 INTRODUCTION TO CLOUD
DEFINITION:
The cloud is a large group of interconnected computers. These computers can be
personal computers or network servers; they can be public or private. Cloud computing
is a technology that uses the internet and central remote servers to maintain data and
applications.
Eg: Yahoo email or Gmail etc.
THE VISION OF CLOUD COMPUTING:
The virtual provision of cloud computing is hardware, runtime environment and
resources for a user by paying money. As of these items can be used as long as the User,
no upfront commitment requirement. The whole computer device collection is turned
into a Utilities set that can be supplied and composed in hours rather than days together,
to deploy devices without Costs for maintenance.
A cloud computer's long-term vision is that IT services are traded without
technology and as utilities on an open market as barriers to the rules. We can hope in
the near future that it can be identified the solution that clearly satisfies our needs
entering our application on a global digital market services for cloud computing. This
market will make it possible to automate the process of discovery and integration with
its existing software systems. A digital cloud trading platform is available services will
also enable service providers to boost their revenue. A cloud service may also be a
competitor's customer service to meet its consumer commitments.
Company and personal data is accessible in structured formats everywhere,
which helps us to access and communicate easily on an even larger level. Cloud
computing's security and stability will continue to improve, making it even safer with a
wide variety of techniques. Instead of concentrating on what services and applications
they allow, we do not consider "cloud" to be the most relevant technology. The
combination of the wearable and the Bringing Your Own Device (BYOD) with cloud
technology with the Internet of Things (IoT) would become a common necessity in
person and working life such that cloud technology is overlooked as an enabler.
Figure 1.2. Cloud computing vision.
A CLOSER LOOK:
Cloud computing is useful in governments, enterprises, public and private
institutions and research organizations which make more effective and demand-driven
computing services systems. There seem to be a number of specific examples
demonstrating emerging applications of cloud computing in both established companies
and startups. Such cases are intended to illustrate the value proposition of viable cloud
computing solutions and the benefits businesses have gained from these services.
NewYork Times:
One of the most widely known examples of cloud computing commitment comes from
New York Times. The New York Times has collected a large number of high-resolution
scanned images of historical newspapers, ranging from 1851-1922. They want to
process this set of images into separate articles in PDF format. The New York Times
had the option to utilize 100 servers for 24 hours at the low standard cost of ten cent an
hour for every server. In the event that the New York times had bought even a solitary
server for this errand, the probable expense would have surpassed the $890 for simply
the hardware, and they likewise need to think about the expense of administration,
power and cooling Likewise, the handling would have assumed control more than a
quarter of a year with one server.
On the off chance that the New York Times had bought four servers, it would
have still taken almost a month of calculation time. The quick turnaround time and
endlessly lower cost emphatically represents the prevalent estimation of cloud services.
Washington Post:
The Washington Post were able to transform 17,481 pages of scanned document
images into a searchable database in just a day using Amazon EC2(Amazon Elastic
Compute Cloud- is a cloud computing platform). On March 19th at 10am, Hillary
Clinton’s official White House schedule from 1993-2001 was published to the public
as a large array of scanned photographs (in PDF format).
Washington Post programmer Peter Harkins utilized 200 Amazon EC2 instances
to conduct OCR (Optical Character Recognition) on the scanned files to create
searchable text – “I used 1,407 hours of virtual machine time with a total cost of
$144.62. We find it a positive proof of concept.
How all of the computing made possible? in same IT services on demand like
computing power, storage and providing an runtime environments for development of
an applications on pay-as-you go basis. Cloud computing not only provides an
opportunity for easily accessing of IT services as per demand, but also provides newly
ideas regarding IT Services and resources as am utilities. Figure 1.4 provides a bird’s-
eye view of cloud computing.
There are three deployment models for accessing the services of cloud
computing environment are public, private and hybrids clouds. The public cloud is
one of the most common deployment models in which computing services is offered by
third-party vendors that the consumer are able to access and purchase the resource from
the public cloud via the public internet. These can be free or on-demand, meaning that
consumers pay for their CPU cycles, storage or bandwidth per use. Public clouds will
save companies from the expensive procurement, Management and on-site maintenance
of hardware and application infrastructure — all management and maintenance of the
system is held to responsibility of the cloud service provider.
Public clouds can also be deployed faster than on-site infrastructures with a
platform almost constantly scalable. Although securityissues have been posed by public
cloud implementations, the public cloud could be as secure as the most efficiently
operated private cloud deployment when it is implemented correctly.
A private cloud is an essentially one organization's cloud service. In using a
private cloud, the advantages of cloud computing are experienced without sharing
resources with other organizations. There can be a private cloud within an organization,
or be controlled from a third party remotely, and accessed via the Internet (but it is not
shared with others, unlike a public cloud). Private cloud incorporates several of the
advantages of cloud computing — including elasticity, scalability and easy service
delivery — with the on-site control, security, and resource customization.
Many companies select private cloud over public cloud because private cloud is
a simpler way to satisfy their regulatory compliance requirements. Others prefer private
cloud because their workloads deal with confidential information, intellectual property,
and personally identifiable information (PII), medical records, financial data and other
sensitive data.
Hybrid cloud is an infrastructure that contains links between a user's cloud
(typically referred to as "private cloud") and a third-party cloud (typically referred to as
"public cloud"). Whilst the private and public areas of the hybrid cloud are linked, they
remain unique. This allows a hybrid cloud to simultaneously offer the advantages of
several implementation models. The sophistication of hybrid clouds is very different.
Some hybrid clouds, for example, only connect the on-site to public clouds. The
operations and application teams are responsible for all the difficulties inherent in the
two different infrastructures.
THE CLOUD COMPUTING REFERENCE MODEL
Fig 1: The Cloud Computing Reference Model
The NIST cloud computing reference architecture Fig 1 defines five major actors:
1. Cloud consumer
2. Cloud provider
3. Cloud carrier
4. Cloud auditor and
5. Cloud broker.
Each actor is an entity (a person or an organization) that participates in a transaction
or process and/or performs tasks in cloud computing.
Actors in Cloud Computing
Table 1: Actors in Cloud Computing
S.NO ACTOR DEFINITION
1. Cloud
Consumer
A person or organization that maintains a business
relationship with, and uses service from, Cloud Providers
2. Cloud
Provider
A person, organization, or entity responsible for making a
service available to interested parties.
3. Cloud
Auditor
A party that can conduct independent assessment of cloud
services, information system operations, performance and
security of the cloud implementation.
4. Cloud
Broker
An entity that manages the use, performance and delivery of
cloud services, and negotiates relationships between Cloud
Providers and Cloud Consumers.
5. Cloud
Carrier
An intermediary that provides connectivity and transport of
cloud services from Cloud Providers to Cloud Consumers
Interactions among the actors:
A cloud consumer may request cloud services from a cloud provider directly or via a
cloud broker.
A cloud auditor conducts independent audits and may contact the others to collect
necessary information.
Cloud carriers provide the connectivity and transport of cloud services from cloud
providers to cloud consumers.
A cloud provider participates in and arranges for two unique service level agreements
(SLAs), one with a cloud carrier (e.g. SLA2) and one with a cloud consumer (e.g.
SLA1).
A cloud provider arranges service level agreements (SLAs) with encrypted connections
to ensure the cloud services are consumed at a consistent level according to the
contractual obligations with the cloud consumers.
A cloud service, a cloud auditor conducts independent assessments of the operation and
security of the cloud service implementation. The audit may involve interactions with
both the Cloud Consumer and the Cloud Provider.
CHARACTERISTICS AND BENEFITS
1. Resources Pooling:
This means that the Cloud provider used a multi-leaner model to deliver the
computing resources to various customers. There are various allocated and reassigned
physical and virtual resources, which rely on customer demand. In general, the customer
has no control or information about the location of the resources provided, but can
choose location on a higher level of abstraction.
2. On-Demand Self-Service:
This is one of the main and useful advantages of Cloud Computing as the user
can track server uptimes, capability and network storage on an ongoing basis. The user
can also monitor computing functionalities with this feature.
3. Easy Maintenance:
The servers are managed easily and the downtime is small and there are no
downtime except in some cases. Cloud Computing offers an update every time that
increasingly enhances it. The updates are more system friendly and operate with patched
bugs faster than the older ones.
4. Large Network Access:
The user may use a device and an Internet connection to access the cloud data or
upload it to the cloud from anywhere. Such capabilities can be accessed across the
network and through the internet.
5. Availability:
The cloud capabilities can be changed and expanded according to the usage. This
review helps the consumer to buy additional cloud storage for a very small price, if
necessary.
6. Automatic System:
Cloud computing analyzes the data required automatically and supports a certain
service level of measuring capabilities. It is possible to track, manage and report the
usage. It provides both the host and the customer with accountability.
7. Economical:
It is a one-off investment since the company (host) is required to buy the storage,
which can be made available to many companies, which save the host from monthly or
annual costs. Only the amount spent on the basic maintenance and some additional costs
are much smaller.
8. Security:
Cloud Security is one of cloud computing's best features. It provides a snapshot
of the data stored so that even if one of the servers is damaged, the data cannot get lost.
The information is stored on the storage devices, which no other person can hack or use.
The service of storage is fast and reliable.
9. Pay as you go:
Users only have to pay for the service or the space in cloud computing. No hidden
or additional charge to be paid is liable to pay. The service is economical and space is
often allocated free of charge.
10. Measured Service:
Cloud Computing resources that the company uses to monitor and record. This
use of resources is analyzed by charge-per-use capabilities. This means that resource
use can be measured and reported by the service provider, either on the virtual server
instances running through the cloud. You will receive a models pay depending on the
manufacturing company's actual consumption.
CHALLENGES AHEAD:
All has advantages and challenges. We saw many Cloud features and it’s time to
identify the Cloud computing challenges with tips and techniques you can identify all
your own. Let's therefore start to explore cloud computing risk and challenges. Nearly
all companies are using cloud computing because companies need to store the data. The
companies generate and store a tremendous amount of data.
Thus, they face many security issues. Companies would include establishments
to streamline and optimize the process and to improve cloud computing management.
This is a list of all cloud computing threats and challenges:
1. Security & Privacy
2. Interoperability & Portability
3. Reliable and flexible
4. Cost
5. Downtime
6. Lack of resources
7. Dealing with Multi-Cloud Environments
8. Cloud Migration
9. Vendor Lock-In
10. Privacy and Legal issues
1. Security and Privacy of Cloud:
The cloud data store must be secure and confidential. The clients are so dependent on
the cloud provider. In other words, the cloud provider must take security measures
necessary to secure customer data. Securities are also the customer's liability because
they must have a good password, don't share the password with others, and update our
password on a regular basis. If the data are outside of the firewall, certain problems may
occur that the cloud provider can eliminate. Hacking and malware are also one of the
biggest problems because they can affect many customers. Data loss can result; the
encrypted file system and several other issues can be disrupted.
2. Interoperability and Portability:
Migration services into and out of the cloud shall be provided to the Customer. No bond
period should be allowed, as the customers can be hampered. The cloud will be capable
of supplying premises facilities. Remote access is one of the cloud obstacles, removing
the ability for the cloud provider to access the cloud from anywhere.
3. Reliable and Flexible:
Reliability and flexibility are indeed a difficult task for cloud customers, which can
eliminate leakage of the data provided to the cloud and provide customer trust
worthiness. To overcome this challenge, thirdparty services should be monitored and
the performance, robustness, and dependence of companies supervised.
4. Cost:
Cloud computing is affordable, but it can be sometimes expensive to change the cloud
to customer demand. In addition, it can hinder the small business by altering the cloud
as demand can sometimes cost more. Furthermore, it is sometimes costly to transfer
premises.
5. Downtime:
Downtime is the most popular cloud computing challenge as a platform free from
downtime is guaranteed by no cloud provider. Internet connection also plays an
important role, as it can be a problem if a company has a non-trust worthy internet
connection, because it faces downtime.
6. Lack of resources:
The cloud industry also faces a lack of resources and expertise, with many businesses
hoping to overcome it by hiring new, more experienced employees. These challenges
of the business but will also train existing employees to benefit the company. Currently,
many IT employees work to enhance cloud computing skills and it is difficult for the
chief executive because the employees are little qualified. It claims that employees with
exposure of the latest innovations and associated technology would be more important
in businesses.
7. Dealing with Multi-Cloud Environments:
Today not even a single cloud is operating with full According to the Right Scale report
revelation, almost 84 percent of enterprises adopt a multi cloud approaches mixed with
the public and private clouds. In addition, five different public and private clouds are
used by organizations.
8. Vendor lock-in:
The problem with vendor lock-in cloud computing includes clients being reliant (i.e.
locked in) on the implementation of a single Cloud provider and not switching to
another vendor without any significant costs, regulatory restrictions or technological
incompatibilities in the future.
The lock-up situation can be seen in apps for specific cloud platforms, such as
Amazon EC2, Microsoft Azure, that are not easily transferred to any other cloud
platform and that users are vulnerable to changes made by their providers to further
confirm the lenses of a software developer. In fact, the issue of lock-in arises when, for
example, a company decide to modify cloud providers but cannot move applications or
data across different cloud services, as the semantics of cloud providers' resources and
services do not correspond.
For these reasons, from the point of view of the company it is important to
maintain flexibility in changing providers according to business needs or even to
maintain in-house certain components which are less critical to safety due to risks. The
issue of supplier lock-in will prevent interoperability and portability between cloud
providers. It is the way for cloud providers and clients to become more competitive.
10. Privacy and Legal issues:
Apparently, the main problem regarding cloud privacy/data security is 'data
breach.' Infringement of data can be generically defined as loss of electronically
encrypted personal information. An infringement of the information could lead to a
multitude of losses both for the provider and for the customer; identity theft, debit/credit
card fraud for the customer, loss of credibility, future prosecutions and so on.
HISTORICAL DEVELOPMENTS
History of Cloud Computing:
Cloud computing is one of today's most breakthrough technology. Then there's a brief
cloud-computing history.
EARLY 1960S:
Computer scientist John McCarthy has a time allows the organization to use an
expensive mainframe at the same time. This machine is described as a major
contribution to Internet development, and as a leader in cloud computing.
IN 1969:
J.C.R. Licklider, responsible for the creation of the Advanced Research Projects
Agency (ARPANET), proposed the idea of "Intergalactic Computer Network" or
"Galactic Network" (a computer networking term similar to everyone around the world
and access programs and data from anywhere.
IN 1970:
Usage of tools such as VMware for operating system can be run in a separate
environment simultaneously. In a different operating system it was possible to operate
a completely different computer (virtual machine).
IN 1997:
Prof Ramnath Chellappa in Dallas in 1997 seems to be the first known definition of
"cloud computing," "a paradigm in which computing boundaries are defined solely on
economic alone."
IN 1999:
Salesforce.com was launched in 1999 as the pioneer of delivering client applications
through its simple website. The services firm has been able to provide applications via
the Inter mainstream software companies.
IN 2003:
This first public release of Xen, is a software system that enables multiple virtual guest
operating systems to be run simultaneous on a single machine, which also known as the
Virtual Machine Monitor (VMM) as a hypervisor.
IN 2006:
The Amazon cloud service was launched in 2006. First, its Elastic Compute Cloud (
EC2) allowed people to use their own cloud applications and to access computers.
Simple Storage Service (S3) was then released. This incorporated the user-as-you-go
model and has become the standard procedure for both users and the industry as a
whole.
IN 2013:
A total of £ 78 billion in the world’s market for public cloud services was increased by
18.5% in 2012, with IaaS as one of the fastest growing services on the market.
IN 2014:
Global business spending for cloud-related technology and services is estimated to be
£ 103.8 billion in 2014, up 20% from 2013 (Constellation Research). Figure gives an
analysis of the development of cloud computing distributed technologies.
When we track the historic developments, we review briefly five key technologies that
have played a significant role in cloud computing. They are distributed systems,
virtualization, Web 2.0, service orientation and utility computing.
DISTRIBUTED SYSTEM
Distributed System is a collection of autonomous computer systems that are physically
separated but are connected by a centralized computer network that is equipped with
distributed system software.
Example of Distributed System:
Any Social Media can have its Centralized Computer Network as its Headquarters and
computer systems that can be accessed by any user and using their services will be the
Autonomous Systems in the Distributed System Architecture.
Fig : Distributed System
 Distributed System Software: This Software enables computers to coordinate their
activities and to share the resources such as Hardware, Software, Data, etc.
 Database: It is used to store the processed data that are processed by each
Node/System of the Distributed systems that are connected to the Centralized
network.
Types of Distributed Systems
Two different types of distributed systems in the networking architecture.
Client/Server Systems
In client server systems, the client requests a resource and the server provides that
resource. A server may serve multiple clients at the same time while a client is in contact
with only one server. Both the client and server usually communicate via a computer
network and so they are a part of distributed systems.
Peer to Peer Systems
The peer to peer systems contains nodes that are equal participants in data sharing. All
the tasks are equally divided between all the nodes. The nodes interact with each other
as required as share resources. This is done with the help of a network.
Advantages of Distributed Systems
● Can easily share data with other nodes.
● More nodes can easily be added to the distributed system i.e. it can be scaled as
required.
● Failure of one node does not lead to the failure of the entire distributed system. Other
nodes can still communicate with each other.
● Resources like printers can be shared with multiple nodes rather than being restricted
to just one.
Disadvantages of Distributed Systems
● It is difficult to provide adequate security in distributed systems because the nodes as
well as the connections need to be secured.
● Some messages and data can be lost in the network while moving from one node to
another.
● The database connected to the distributed systems is quite complicated and difficult
to handle as compared to a single user system.
● Overloading may occur in the network if all the nodes of the distributed system try to
send data at once.
Applications Area of Distributed System
 Finance and Commerce: Amazon, eBay, Online Banking, E-Commerce websites.
 Information Society: Search Engines, Wikipedia, Social Networking, Cloud
Computing.
 Cloud Technologies: AWS, Salesforce, Microsoft Azure, SAP(System Application
and Products)
 Entertainment: Online Gaming, Music, Youtube.
 Healthcare: Online patient records, Health Informatics.
 Education: E-learning.
 Transport and logistics: GPS, Google Maps.
 Environment Management: Sensor technologies.
VIRTUALIZATION
Virtualization is technology that you can use to create virtual representations
of servers, storage, networks, and other physical machines.
The concept of virtualization was first devised in the 1960s. It was then
implemented by IBM to help split large mainframe machines into separate ‘virtual
machines’. The reason why this was done was to maximize their available mainframe
computers efficiency. One of the most important ideas behind cloud computing is
scalability, and the key technology that makes that possible is virtualization.
It was initially developed during the mainframe era. It involves using
specialized software to create a virtual or software-created version of a computing
resource rather than the actual version of the same resource.
With the help of Virtualization, multiple operating systems and applications
can run on the same machine and its same hardware at the same time, increasing the
utilization and flexibility of hardware.
 Host Machine: The machine on which the virtual machine is going to be built is
known as Host Machine.
 Guest Machine: The virtual machine is referred to as a Guest Machine.
Benefits of Virtualization
 More flexible and efficient allocation of resources.
 Enhance development productivity.
 It lowers the cost of IT infrastructure.
 Remote access and rapid scalability.
 High availability and disaster recovery.
 Pay peruse of the IT infrastructure on demand.
 Enables running multiple operating systems.
Characteristics of Virtualization
Virtualization is a fundamental technology that plays a pivotal role in the field of cloud
computing. It forms the cornerstone upon which the flexibility, scalability, and
efficiency of cloud services are built.
We will divide into the characteristics of virtualization in cloud computing, they are
 Increased Security: The ability to control the execution of a guest program in a
completely transparent manner opens new possibilities for delivering a secure,
controlled execution environment. All the operations of the guest programs are
generally performed against the virtual machine, which then translates and applies
them to the host programs.
 Managed Execution: In particular, sharing, aggregation, emulation and are the
most relevant features.
 Sharing: Virtualization allows the creation of a separate computing environment
within the same host.
 Aggregation: It is possible to share physical resources among several guests, but
virtualization also allows aggregation, which is the opposite process.
 Emulation: Emulation Cloud is an open application development environment
that helps customers and third-party developers create, test, and fine-tune
customized applications in a completely virtual environment.
Components of virtualized environments: Virtualization is a broad concept that
refers to the creation of a virtual version of something, whether hardware, software
environment, storage, or network. In a virtualized environment there are three major
components: guest, host, and virtualization layer.
Three major Components falls under this category in a virtualized environment:
1. GUEST:
The guest represents the system component that interacts with the virtualization
layer rather than with the host, as would normally happen. Guests usually consist of
one or more virtual disk files, and a VM file. Virtual Machines are centrally managed
by a host application that sees and manages each virtual machine as a different
application.
2. HOST:
The host represents the original environment where the guest is supposed to be
managed. Each guest runs on the host using shared resources donated to it by the host.
The operating system, works as the host and manages the physical resource
management, and the device support.
3. VIRTUALIZATION LAYER:
The virtualization layer is responsible for recreating the same or a different
environment where the guest will operate. It is an additional abstraction layer between
a network and storage hardware, computing, and the application running on it. Usually
it helps to run a single operating system per machine which can be very inflexible
compared to the usage of virtualization.
The most intuitive and popular is Hardware Virtualization, which also
constitutes the original realization of the Virtualization Concept.
Here in Hardware Virtualization Guest is represented by a system image which
is comprised of an operating system and installed applications. These are installed on
top of virtual hardware that is controlled and managed by the virtualization layer, also
called the Virtual Machine Manager. The host is instead represented by the physical
hardware and in some cases the operating system, which defines the environment
where the virtual machine manager is running.
Virtualization and cloud computing
Virtualization plays an important role in cloud computing since it allows for
the appropriate degree of customization, security, isolation, and manageability that are
fundamental for delivering IT services on demand.
Virtualization technologies are primarily used to offer configurable computing
environments and storage. A virtual computer system is known as a “virtual machine”
(VM): a tightly isolated software container with an operating system and application
inside.
Each self-contained VM is completely independent. Putting multiple VMs on
a single computer enables several operating systems and applications to run on just
one physical server, or “host”. A thin layer of software called a hypervisor decouples
the virtual machines from the host and dynamically allocates computing resources to
each virtual machine as needed.
Taxonomy of Virtualization Techniques
Virtualization covers a wide range of emulation techniques that are applied to different
areas of computing.
A classification of these techniques helps us better understand their characteristics and
use. We can divide the execution virtualization techniques into two major categories
by considering the type of host they require.
 Process-level techniques are implemented on top of an existing operating system,
which has full control of the hardware.
 System-level techniques are implemented directly on hardware and do not
require - or require a minimum of support from - an existing operating system
Execution virtualization:
 Execution virtualization includes all techniques that aim to emulate an execution
environment that is separate from the one hosting the virtualization layer.
 Execution virtualization can be implemented directly on top of the hardware by
the operating system, an application, or libraries dynamically or statically linked
to an application image.
Hardware-level virtualization:
 Hardware-level virtualization is a virtualization technique that provides an
abstract execution environment in terms of computer hardware on top of which
a guest operating system can be run.
 Hardware-level virtualization is also called system virtualization, which is the
representation of the hardware interface of a system.
PROS AND CONS OF CLOUD COMPUTING
Advantages
• Lower-Cost Computers for Users
• Improved Performance
• Lower IT Infrastructure Costs
• Fewer Maintenance Issues
• Lower Software Costs
• Instant Software Updates
• Increased Computing Power
• Unlimited Storage Capacity
• Increased Data Safety
• Improved Compatibility between Operating Systems
• Improved Document Format Compatibility
• Easier Group Collaboration
• Universal Access to Documents
• Latest Version Availability
• Removes the Tether to Specific Devices
Dis-Advantages
● Requires a Constant Internet Connection
● Doesn’t Work Well with Low-Speed Connections
● Can Be Slow
● Features Might Be Limited
● Stored Data Might Not Be Secure
● Problem will arise If Data loss occurs
Technology Examples
VMware
VMware is defined as a set of software and solutions that help convert the actual
computer, server, or pool of similar hardware into several virtual machines that may
be used for a variety of tasks. Their most popular virtualization applications are briefly
detailed below.
1-Desktop Editions
VMware Workstation – Is one of the longest running modern day virtualization
applications. It allows users to create multiple x86-based virtual machines on a single
physical machine. A wide number of guest operating systems such as Windows, Linux
and MAC OSX can then be installed on to these virtual machines.
VMware Fusion – This is similar to VMware Workstation, the only difference is that
VMware Fusion was designed for users of the Mac Intel hardware platform.
VMware Player – This application is a freeware application and is offered to users
who do not have a licence to run VMware Workstation or VMware Fusion. Unlike the
other two applications, VMware Player cannot create virtual machines, however it can
run them.
2-Server Editions
VMware ESX Server – This is an enterprise level virtualization product that is
offered by VMware. It does not require a host OS to be installed as it is installed
directly onto a server’s hardware. This is unlike the desktop editions which are
installed as applications from within their host OS. VMware ESX Server is much more
efficient than other virtualization technologies because it has lower system overheads
and interacts with its hardware directly.
VMware ESXi – This application is similar to the VMware ESX Server application.
The only difference is that it takes up less memory, because its Service Console is
replaced with a simpler interface.
VMware Server – This is VMwares free server virtualization application. It is an
application which needs to be installed onto a host OS that is either Window or Linux
based. Due to this fact it is not as efficient as the other VMware server editions, which
are installed directly on their hardware. However VMware Server does allow you to
create multiple virtual machines which can have a number of different guest operating
systems installed.

More Related Content

Similar to Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf

Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security IssuesIJERA Editor
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Cloud computing white paper
Cloud computing white paperCloud computing white paper
Cloud computing white paperVaneesh Bahl
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingvishnu varunan
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxAschalewAyele2
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...Govt. P.G. College Dharamshala
 
Across the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxAcross the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxdaniahendric
 

Similar to Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf (20)

Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Sami-Cloud
Sami-CloudSami-Cloud
Sami-Cloud
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Cloud computing white paper
Cloud computing white paperCloud computing white paper
Cloud computing white paper
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
G0314043
G0314043G0314043
G0314043
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
 
Cloud Computing paradigm
Cloud Computing paradigmCloud Computing paradigm
Cloud Computing paradigm
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS)  Cloud D...
Cloud Infrastructure m Service Delivery Models (IAAS, PAAS and SAAS) Cloud D...
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
Seminar
SeminarSeminar
Seminar
 
Across the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxAcross the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docx
 

More from Dr.Florence Dayana

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.Florence Dayana
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxDr.Florence Dayana
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfDr.Florence Dayana
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfDr.Florence Dayana
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfDr.Florence Dayana
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - ReadingDr.Florence Dayana
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - SpeakingDr.Florence Dayana
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - ListeningDr.Florence Dayana
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket LayerDr.Florence Dayana
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaverDr.Florence Dayana
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layerDr.Florence Dayana
 
M.Florence Dayana Computer Networks Types
M.Florence Dayana  Computer Networks TypesM.Florence Dayana  Computer Networks Types
M.Florence Dayana Computer Networks TypesDr.Florence Dayana
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks IntroductionDr.Florence Dayana
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMDr.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageDr.Florence Dayana
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityDr.Florence Dayana
 
M.FLORENCE DAYANA WEB DESIGN -Unit 5 XML
M.FLORENCE DAYANA WEB DESIGN -Unit 5   XMLM.FLORENCE DAYANA WEB DESIGN -Unit 5   XML
M.FLORENCE DAYANA WEB DESIGN -Unit 5 XMLDr.Florence Dayana
 

More from Dr.Florence Dayana (20)

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - Reading
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - Speaking
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - Listening
 
INPUT AND OUTPUT DEVICES.pdf
INPUT  AND OUTPUT DEVICES.pdfINPUT  AND OUTPUT DEVICES.pdf
INPUT AND OUTPUT DEVICES.pdf
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaver
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layer
 
M.Florence Dayana Computer Networks Types
M.Florence Dayana  Computer Networks TypesM.Florence Dayana  Computer Networks Types
M.Florence Dayana Computer Networks Types
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
 
M.Florence Dayana
M.Florence DayanaM.Florence Dayana
M.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C Language
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network security
 
M.FLORENCE DAYANA WEB DESIGN -Unit 5 XML
M.FLORENCE DAYANA WEB DESIGN -Unit 5   XMLM.FLORENCE DAYANA WEB DESIGN -Unit 5   XML
M.FLORENCE DAYANA WEB DESIGN -Unit 5 XML
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf

  • 1. CORE COURSE VIII CLOUD COMPUTING Credit: 5 UNIT -1 INTRODUCTION TO CLOUD DEFINITION: The cloud is a large group of interconnected computers. These computers can be personal computers or network servers; they can be public or private. Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Eg: Yahoo email or Gmail etc. THE VISION OF CLOUD COMPUTING: The virtual provision of cloud computing is hardware, runtime environment and resources for a user by paying money. As of these items can be used as long as the User, no upfront commitment requirement. The whole computer device collection is turned into a Utilities set that can be supplied and composed in hours rather than days together, to deploy devices without Costs for maintenance. A cloud computer's long-term vision is that IT services are traded without technology and as utilities on an open market as barriers to the rules. We can hope in the near future that it can be identified the solution that clearly satisfies our needs entering our application on a global digital market services for cloud computing. This market will make it possible to automate the process of discovery and integration with its existing software systems. A digital cloud trading platform is available services will also enable service providers to boost their revenue. A cloud service may also be a competitor's customer service to meet its consumer commitments. Company and personal data is accessible in structured formats everywhere, which helps us to access and communicate easily on an even larger level. Cloud computing's security and stability will continue to improve, making it even safer with a wide variety of techniques. Instead of concentrating on what services and applications they allow, we do not consider "cloud" to be the most relevant technology. The combination of the wearable and the Bringing Your Own Device (BYOD) with cloud technology with the Internet of Things (IoT) would become a common necessity in person and working life such that cloud technology is overlooked as an enabler. Figure 1.2. Cloud computing vision.
  • 2. A CLOSER LOOK: Cloud computing is useful in governments, enterprises, public and private institutions and research organizations which make more effective and demand-driven computing services systems. There seem to be a number of specific examples demonstrating emerging applications of cloud computing in both established companies and startups. Such cases are intended to illustrate the value proposition of viable cloud computing solutions and the benefits businesses have gained from these services. NewYork Times: One of the most widely known examples of cloud computing commitment comes from New York Times. The New York Times has collected a large number of high-resolution scanned images of historical newspapers, ranging from 1851-1922. They want to process this set of images into separate articles in PDF format. The New York Times had the option to utilize 100 servers for 24 hours at the low standard cost of ten cent an hour for every server. In the event that the New York times had bought even a solitary server for this errand, the probable expense would have surpassed the $890 for simply the hardware, and they likewise need to think about the expense of administration, power and cooling Likewise, the handling would have assumed control more than a quarter of a year with one server. On the off chance that the New York Times had bought four servers, it would have still taken almost a month of calculation time. The quick turnaround time and endlessly lower cost emphatically represents the prevalent estimation of cloud services. Washington Post: The Washington Post were able to transform 17,481 pages of scanned document images into a searchable database in just a day using Amazon EC2(Amazon Elastic Compute Cloud- is a cloud computing platform). On March 19th at 10am, Hillary Clinton’s official White House schedule from 1993-2001 was published to the public as a large array of scanned photographs (in PDF format). Washington Post programmer Peter Harkins utilized 200 Amazon EC2 instances to conduct OCR (Optical Character Recognition) on the scanned files to create searchable text – “I used 1,407 hours of virtual machine time with a total cost of $144.62. We find it a positive proof of concept. How all of the computing made possible? in same IT services on demand like computing power, storage and providing an runtime environments for development of an applications on pay-as-you go basis. Cloud computing not only provides an opportunity for easily accessing of IT services as per demand, but also provides newly ideas regarding IT Services and resources as am utilities. Figure 1.4 provides a bird’s- eye view of cloud computing.
  • 3. There are three deployment models for accessing the services of cloud computing environment are public, private and hybrids clouds. The public cloud is one of the most common deployment models in which computing services is offered by third-party vendors that the consumer are able to access and purchase the resource from the public cloud via the public internet. These can be free or on-demand, meaning that consumers pay for their CPU cycles, storage or bandwidth per use. Public clouds will save companies from the expensive procurement, Management and on-site maintenance of hardware and application infrastructure — all management and maintenance of the system is held to responsibility of the cloud service provider. Public clouds can also be deployed faster than on-site infrastructures with a platform almost constantly scalable. Although securityissues have been posed by public cloud implementations, the public cloud could be as secure as the most efficiently operated private cloud deployment when it is implemented correctly. A private cloud is an essentially one organization's cloud service. In using a private cloud, the advantages of cloud computing are experienced without sharing resources with other organizations. There can be a private cloud within an organization, or be controlled from a third party remotely, and accessed via the Internet (but it is not shared with others, unlike a public cloud). Private cloud incorporates several of the advantages of cloud computing — including elasticity, scalability and easy service delivery — with the on-site control, security, and resource customization. Many companies select private cloud over public cloud because private cloud is a simpler way to satisfy their regulatory compliance requirements. Others prefer private cloud because their workloads deal with confidential information, intellectual property, and personally identifiable information (PII), medical records, financial data and other sensitive data. Hybrid cloud is an infrastructure that contains links between a user's cloud (typically referred to as "private cloud") and a third-party cloud (typically referred to as "public cloud"). Whilst the private and public areas of the hybrid cloud are linked, they remain unique. This allows a hybrid cloud to simultaneously offer the advantages of several implementation models. The sophistication of hybrid clouds is very different. Some hybrid clouds, for example, only connect the on-site to public clouds. The operations and application teams are responsible for all the difficulties inherent in the two different infrastructures.
  • 4. THE CLOUD COMPUTING REFERENCE MODEL Fig 1: The Cloud Computing Reference Model The NIST cloud computing reference architecture Fig 1 defines five major actors: 1. Cloud consumer 2. Cloud provider 3. Cloud carrier 4. Cloud auditor and 5. Cloud broker. Each actor is an entity (a person or an organization) that participates in a transaction or process and/or performs tasks in cloud computing. Actors in Cloud Computing Table 1: Actors in Cloud Computing S.NO ACTOR DEFINITION 1. Cloud Consumer A person or organization that maintains a business relationship with, and uses service from, Cloud Providers 2. Cloud Provider A person, organization, or entity responsible for making a service available to interested parties. 3. Cloud Auditor A party that can conduct independent assessment of cloud services, information system operations, performance and security of the cloud implementation. 4. Cloud Broker An entity that manages the use, performance and delivery of cloud services, and negotiates relationships between Cloud Providers and Cloud Consumers. 5. Cloud Carrier An intermediary that provides connectivity and transport of cloud services from Cloud Providers to Cloud Consumers
  • 5. Interactions among the actors: A cloud consumer may request cloud services from a cloud provider directly or via a cloud broker. A cloud auditor conducts independent audits and may contact the others to collect necessary information. Cloud carriers provide the connectivity and transport of cloud services from cloud providers to cloud consumers. A cloud provider participates in and arranges for two unique service level agreements (SLAs), one with a cloud carrier (e.g. SLA2) and one with a cloud consumer (e.g. SLA1). A cloud provider arranges service level agreements (SLAs) with encrypted connections to ensure the cloud services are consumed at a consistent level according to the contractual obligations with the cloud consumers. A cloud service, a cloud auditor conducts independent assessments of the operation and security of the cloud service implementation. The audit may involve interactions with both the Cloud Consumer and the Cloud Provider. CHARACTERISTICS AND BENEFITS 1. Resources Pooling: This means that the Cloud provider used a multi-leaner model to deliver the computing resources to various customers. There are various allocated and reassigned physical and virtual resources, which rely on customer demand. In general, the customer has no control or information about the location of the resources provided, but can choose location on a higher level of abstraction. 2. On-Demand Self-Service: This is one of the main and useful advantages of Cloud Computing as the user can track server uptimes, capability and network storage on an ongoing basis. The user can also monitor computing functionalities with this feature. 3. Easy Maintenance: The servers are managed easily and the downtime is small and there are no downtime except in some cases. Cloud Computing offers an update every time that increasingly enhances it. The updates are more system friendly and operate with patched bugs faster than the older ones. 4. Large Network Access: The user may use a device and an Internet connection to access the cloud data or upload it to the cloud from anywhere. Such capabilities can be accessed across the network and through the internet. 5. Availability: The cloud capabilities can be changed and expanded according to the usage. This review helps the consumer to buy additional cloud storage for a very small price, if necessary.
  • 6. 6. Automatic System: Cloud computing analyzes the data required automatically and supports a certain service level of measuring capabilities. It is possible to track, manage and report the usage. It provides both the host and the customer with accountability. 7. Economical: It is a one-off investment since the company (host) is required to buy the storage, which can be made available to many companies, which save the host from monthly or annual costs. Only the amount spent on the basic maintenance and some additional costs are much smaller. 8. Security: Cloud Security is one of cloud computing's best features. It provides a snapshot of the data stored so that even if one of the servers is damaged, the data cannot get lost. The information is stored on the storage devices, which no other person can hack or use. The service of storage is fast and reliable. 9. Pay as you go: Users only have to pay for the service or the space in cloud computing. No hidden or additional charge to be paid is liable to pay. The service is economical and space is often allocated free of charge. 10. Measured Service: Cloud Computing resources that the company uses to monitor and record. This use of resources is analyzed by charge-per-use capabilities. This means that resource use can be measured and reported by the service provider, either on the virtual server instances running through the cloud. You will receive a models pay depending on the manufacturing company's actual consumption. CHALLENGES AHEAD: All has advantages and challenges. We saw many Cloud features and it’s time to identify the Cloud computing challenges with tips and techniques you can identify all your own. Let's therefore start to explore cloud computing risk and challenges. Nearly all companies are using cloud computing because companies need to store the data. The companies generate and store a tremendous amount of data. Thus, they face many security issues. Companies would include establishments to streamline and optimize the process and to improve cloud computing management. This is a list of all cloud computing threats and challenges: 1. Security & Privacy 2. Interoperability & Portability 3. Reliable and flexible 4. Cost 5. Downtime 6. Lack of resources 7. Dealing with Multi-Cloud Environments 8. Cloud Migration 9. Vendor Lock-In 10. Privacy and Legal issues
  • 7. 1. Security and Privacy of Cloud: The cloud data store must be secure and confidential. The clients are so dependent on the cloud provider. In other words, the cloud provider must take security measures necessary to secure customer data. Securities are also the customer's liability because they must have a good password, don't share the password with others, and update our password on a regular basis. If the data are outside of the firewall, certain problems may occur that the cloud provider can eliminate. Hacking and malware are also one of the biggest problems because they can affect many customers. Data loss can result; the encrypted file system and several other issues can be disrupted. 2. Interoperability and Portability: Migration services into and out of the cloud shall be provided to the Customer. No bond period should be allowed, as the customers can be hampered. The cloud will be capable of supplying premises facilities. Remote access is one of the cloud obstacles, removing the ability for the cloud provider to access the cloud from anywhere. 3. Reliable and Flexible: Reliability and flexibility are indeed a difficult task for cloud customers, which can eliminate leakage of the data provided to the cloud and provide customer trust worthiness. To overcome this challenge, thirdparty services should be monitored and the performance, robustness, and dependence of companies supervised. 4. Cost: Cloud computing is affordable, but it can be sometimes expensive to change the cloud to customer demand. In addition, it can hinder the small business by altering the cloud as demand can sometimes cost more. Furthermore, it is sometimes costly to transfer premises. 5. Downtime: Downtime is the most popular cloud computing challenge as a platform free from downtime is guaranteed by no cloud provider. Internet connection also plays an important role, as it can be a problem if a company has a non-trust worthy internet connection, because it faces downtime. 6. Lack of resources: The cloud industry also faces a lack of resources and expertise, with many businesses hoping to overcome it by hiring new, more experienced employees. These challenges of the business but will also train existing employees to benefit the company. Currently, many IT employees work to enhance cloud computing skills and it is difficult for the chief executive because the employees are little qualified. It claims that employees with exposure of the latest innovations and associated technology would be more important in businesses. 7. Dealing with Multi-Cloud Environments: Today not even a single cloud is operating with full According to the Right Scale report revelation, almost 84 percent of enterprises adopt a multi cloud approaches mixed with the public and private clouds. In addition, five different public and private clouds are used by organizations. 8. Vendor lock-in: The problem with vendor lock-in cloud computing includes clients being reliant (i.e. locked in) on the implementation of a single Cloud provider and not switching to
  • 8. another vendor without any significant costs, regulatory restrictions or technological incompatibilities in the future. The lock-up situation can be seen in apps for specific cloud platforms, such as Amazon EC2, Microsoft Azure, that are not easily transferred to any other cloud platform and that users are vulnerable to changes made by their providers to further confirm the lenses of a software developer. In fact, the issue of lock-in arises when, for example, a company decide to modify cloud providers but cannot move applications or data across different cloud services, as the semantics of cloud providers' resources and services do not correspond. For these reasons, from the point of view of the company it is important to maintain flexibility in changing providers according to business needs or even to maintain in-house certain components which are less critical to safety due to risks. The issue of supplier lock-in will prevent interoperability and portability between cloud providers. It is the way for cloud providers and clients to become more competitive. 10. Privacy and Legal issues: Apparently, the main problem regarding cloud privacy/data security is 'data breach.' Infringement of data can be generically defined as loss of electronically encrypted personal information. An infringement of the information could lead to a multitude of losses both for the provider and for the customer; identity theft, debit/credit card fraud for the customer, loss of credibility, future prosecutions and so on. HISTORICAL DEVELOPMENTS History of Cloud Computing: Cloud computing is one of today's most breakthrough technology. Then there's a brief cloud-computing history. EARLY 1960S: Computer scientist John McCarthy has a time allows the organization to use an expensive mainframe at the same time. This machine is described as a major contribution to Internet development, and as a leader in cloud computing. IN 1969: J.C.R. Licklider, responsible for the creation of the Advanced Research Projects Agency (ARPANET), proposed the idea of "Intergalactic Computer Network" or
  • 9. "Galactic Network" (a computer networking term similar to everyone around the world and access programs and data from anywhere. IN 1970: Usage of tools such as VMware for operating system can be run in a separate environment simultaneously. In a different operating system it was possible to operate a completely different computer (virtual machine). IN 1997: Prof Ramnath Chellappa in Dallas in 1997 seems to be the first known definition of "cloud computing," "a paradigm in which computing boundaries are defined solely on economic alone." IN 1999: Salesforce.com was launched in 1999 as the pioneer of delivering client applications through its simple website. The services firm has been able to provide applications via the Inter mainstream software companies. IN 2003: This first public release of Xen, is a software system that enables multiple virtual guest operating systems to be run simultaneous on a single machine, which also known as the Virtual Machine Monitor (VMM) as a hypervisor. IN 2006: The Amazon cloud service was launched in 2006. First, its Elastic Compute Cloud ( EC2) allowed people to use their own cloud applications and to access computers. Simple Storage Service (S3) was then released. This incorporated the user-as-you-go model and has become the standard procedure for both users and the industry as a whole. IN 2013: A total of £ 78 billion in the world’s market for public cloud services was increased by 18.5% in 2012, with IaaS as one of the fastest growing services on the market. IN 2014: Global business spending for cloud-related technology and services is estimated to be £ 103.8 billion in 2014, up 20% from 2013 (Constellation Research). Figure gives an analysis of the development of cloud computing distributed technologies. When we track the historic developments, we review briefly five key technologies that have played a significant role in cloud computing. They are distributed systems, virtualization, Web 2.0, service orientation and utility computing. DISTRIBUTED SYSTEM Distributed System is a collection of autonomous computer systems that are physically separated but are connected by a centralized computer network that is equipped with distributed system software.
  • 10. Example of Distributed System: Any Social Media can have its Centralized Computer Network as its Headquarters and computer systems that can be accessed by any user and using their services will be the Autonomous Systems in the Distributed System Architecture. Fig : Distributed System  Distributed System Software: This Software enables computers to coordinate their activities and to share the resources such as Hardware, Software, Data, etc.  Database: It is used to store the processed data that are processed by each Node/System of the Distributed systems that are connected to the Centralized network. Types of Distributed Systems Two different types of distributed systems in the networking architecture. Client/Server Systems In client server systems, the client requests a resource and the server provides that resource. A server may serve multiple clients at the same time while a client is in contact with only one server. Both the client and server usually communicate via a computer network and so they are a part of distributed systems. Peer to Peer Systems The peer to peer systems contains nodes that are equal participants in data sharing. All the tasks are equally divided between all the nodes. The nodes interact with each other as required as share resources. This is done with the help of a network. Advantages of Distributed Systems ● Can easily share data with other nodes. ● More nodes can easily be added to the distributed system i.e. it can be scaled as required. ● Failure of one node does not lead to the failure of the entire distributed system. Other nodes can still communicate with each other. ● Resources like printers can be shared with multiple nodes rather than being restricted to just one.
  • 11. Disadvantages of Distributed Systems ● It is difficult to provide adequate security in distributed systems because the nodes as well as the connections need to be secured. ● Some messages and data can be lost in the network while moving from one node to another. ● The database connected to the distributed systems is quite complicated and difficult to handle as compared to a single user system. ● Overloading may occur in the network if all the nodes of the distributed system try to send data at once. Applications Area of Distributed System  Finance and Commerce: Amazon, eBay, Online Banking, E-Commerce websites.  Information Society: Search Engines, Wikipedia, Social Networking, Cloud Computing.  Cloud Technologies: AWS, Salesforce, Microsoft Azure, SAP(System Application and Products)  Entertainment: Online Gaming, Music, Youtube.  Healthcare: Online patient records, Health Informatics.  Education: E-learning.  Transport and logistics: GPS, Google Maps.  Environment Management: Sensor technologies. VIRTUALIZATION Virtualization is technology that you can use to create virtual representations of servers, storage, networks, and other physical machines. The concept of virtualization was first devised in the 1960s. It was then implemented by IBM to help split large mainframe machines into separate ‘virtual machines’. The reason why this was done was to maximize their available mainframe computers efficiency. One of the most important ideas behind cloud computing is scalability, and the key technology that makes that possible is virtualization. It was initially developed during the mainframe era. It involves using specialized software to create a virtual or software-created version of a computing resource rather than the actual version of the same resource. With the help of Virtualization, multiple operating systems and applications can run on the same machine and its same hardware at the same time, increasing the utilization and flexibility of hardware.
  • 12.  Host Machine: The machine on which the virtual machine is going to be built is known as Host Machine.  Guest Machine: The virtual machine is referred to as a Guest Machine. Benefits of Virtualization  More flexible and efficient allocation of resources.  Enhance development productivity.  It lowers the cost of IT infrastructure.  Remote access and rapid scalability.  High availability and disaster recovery.  Pay peruse of the IT infrastructure on demand.  Enables running multiple operating systems. Characteristics of Virtualization Virtualization is a fundamental technology that plays a pivotal role in the field of cloud computing. It forms the cornerstone upon which the flexibility, scalability, and efficiency of cloud services are built. We will divide into the characteristics of virtualization in cloud computing, they are  Increased Security: The ability to control the execution of a guest program in a completely transparent manner opens new possibilities for delivering a secure, controlled execution environment. All the operations of the guest programs are generally performed against the virtual machine, which then translates and applies them to the host programs.  Managed Execution: In particular, sharing, aggregation, emulation and are the most relevant features.  Sharing: Virtualization allows the creation of a separate computing environment within the same host.  Aggregation: It is possible to share physical resources among several guests, but virtualization also allows aggregation, which is the opposite process.  Emulation: Emulation Cloud is an open application development environment that helps customers and third-party developers create, test, and fine-tune customized applications in a completely virtual environment. Components of virtualized environments: Virtualization is a broad concept that refers to the creation of a virtual version of something, whether hardware, software environment, storage, or network. In a virtualized environment there are three major components: guest, host, and virtualization layer. Three major Components falls under this category in a virtualized environment:
  • 13. 1. GUEST: The guest represents the system component that interacts with the virtualization layer rather than with the host, as would normally happen. Guests usually consist of one or more virtual disk files, and a VM file. Virtual Machines are centrally managed by a host application that sees and manages each virtual machine as a different application. 2. HOST: The host represents the original environment where the guest is supposed to be managed. Each guest runs on the host using shared resources donated to it by the host. The operating system, works as the host and manages the physical resource management, and the device support. 3. VIRTUALIZATION LAYER: The virtualization layer is responsible for recreating the same or a different environment where the guest will operate. It is an additional abstraction layer between a network and storage hardware, computing, and the application running on it. Usually it helps to run a single operating system per machine which can be very inflexible compared to the usage of virtualization. The most intuitive and popular is Hardware Virtualization, which also constitutes the original realization of the Virtualization Concept. Here in Hardware Virtualization Guest is represented by a system image which is comprised of an operating system and installed applications. These are installed on top of virtual hardware that is controlled and managed by the virtualization layer, also called the Virtual Machine Manager. The host is instead represented by the physical hardware and in some cases the operating system, which defines the environment where the virtual machine manager is running. Virtualization and cloud computing Virtualization plays an important role in cloud computing since it allows for the appropriate degree of customization, security, isolation, and manageability that are fundamental for delivering IT services on demand. Virtualization technologies are primarily used to offer configurable computing environments and storage. A virtual computer system is known as a “virtual machine” (VM): a tightly isolated software container with an operating system and application inside. Each self-contained VM is completely independent. Putting multiple VMs on a single computer enables several operating systems and applications to run on just one physical server, or “host”. A thin layer of software called a hypervisor decouples the virtual machines from the host and dynamically allocates computing resources to each virtual machine as needed.
  • 14. Taxonomy of Virtualization Techniques Virtualization covers a wide range of emulation techniques that are applied to different areas of computing. A classification of these techniques helps us better understand their characteristics and use. We can divide the execution virtualization techniques into two major categories by considering the type of host they require.  Process-level techniques are implemented on top of an existing operating system, which has full control of the hardware.  System-level techniques are implemented directly on hardware and do not require - or require a minimum of support from - an existing operating system Execution virtualization:  Execution virtualization includes all techniques that aim to emulate an execution environment that is separate from the one hosting the virtualization layer.  Execution virtualization can be implemented directly on top of the hardware by the operating system, an application, or libraries dynamically or statically linked to an application image. Hardware-level virtualization:  Hardware-level virtualization is a virtualization technique that provides an abstract execution environment in terms of computer hardware on top of which a guest operating system can be run.  Hardware-level virtualization is also called system virtualization, which is the representation of the hardware interface of a system. PROS AND CONS OF CLOUD COMPUTING Advantages • Lower-Cost Computers for Users • Improved Performance • Lower IT Infrastructure Costs • Fewer Maintenance Issues • Lower Software Costs • Instant Software Updates • Increased Computing Power • Unlimited Storage Capacity
  • 15. • Increased Data Safety • Improved Compatibility between Operating Systems • Improved Document Format Compatibility • Easier Group Collaboration • Universal Access to Documents • Latest Version Availability • Removes the Tether to Specific Devices Dis-Advantages ● Requires a Constant Internet Connection ● Doesn’t Work Well with Low-Speed Connections ● Can Be Slow ● Features Might Be Limited ● Stored Data Might Not Be Secure ● Problem will arise If Data loss occurs Technology Examples VMware VMware is defined as a set of software and solutions that help convert the actual computer, server, or pool of similar hardware into several virtual machines that may be used for a variety of tasks. Their most popular virtualization applications are briefly detailed below. 1-Desktop Editions VMware Workstation – Is one of the longest running modern day virtualization applications. It allows users to create multiple x86-based virtual machines on a single physical machine. A wide number of guest operating systems such as Windows, Linux and MAC OSX can then be installed on to these virtual machines. VMware Fusion – This is similar to VMware Workstation, the only difference is that VMware Fusion was designed for users of the Mac Intel hardware platform. VMware Player – This application is a freeware application and is offered to users who do not have a licence to run VMware Workstation or VMware Fusion. Unlike the other two applications, VMware Player cannot create virtual machines, however it can run them. 2-Server Editions VMware ESX Server – This is an enterprise level virtualization product that is offered by VMware. It does not require a host OS to be installed as it is installed directly onto a server’s hardware. This is unlike the desktop editions which are installed as applications from within their host OS. VMware ESX Server is much more efficient than other virtualization technologies because it has lower system overheads and interacts with its hardware directly. VMware ESXi – This application is similar to the VMware ESX Server application. The only difference is that it takes up less memory, because its Service Console is replaced with a simpler interface.
  • 16. VMware Server – This is VMwares free server virtualization application. It is an application which needs to be installed onto a host OS that is either Window or Linux based. Due to this fact it is not as efficient as the other VMware server editions, which are installed directly on their hardware. However VMware Server does allow you to create multiple virtual machines which can have a number of different guest operating systems installed.