Sunteți pe pagina 1din 8

Bangladesh University of Professionals (BUP)

Assignment on
REQUIREMENTS TO TRANSFER
INFORMATION TECHNOLOGY TO A SERVICE.

Course Title: Cloud Computing


Course Code: MICT-1203

Submitted to:
Dr. Khondokar Habibur Kabir
Lecturer
Department of ICT
Bangladesh University of Professionals (BUP)

Prepared by:
Md Tofazzal Hossain Rasel
Roll No: 1904011
4th Batch, Session: 2018-2019

Date of Submission: 30 July 2019

Faculty of Science & Technology


Department of ICT
Bangladesh University of Professionals (BUP)
REQUIREMENTS TO TRANSFER INFORMATION TECHNOLOGY TO A SERVICE

1. Connectivity:
Connectivity is the ability of a computer, program, device, or system to connect with one or more
others. Network connectivity describes the extensive process of connecting various parts of a
network to one another, for example, through the use of routers, switches and gateways, and how
that process works. Connectivity as a service (CaaS) provides simple, cost effective network
connectivity for the highest quality data transmission, without the need to pay premiums or manage
multiple relationships with multiple service providers.

2. Interactivity:
Interactivity is the involvement of users in technology, the exchange of with computers and the
degree to which this happens. In computers, interactivity is the dialog that occurs between a human
being or possibly another living creature and a computer program.

3. Reliability:
Reliability is the quality of being able to be trusted or believed because of working or behaving
well. It refers to the ability of a computer-related hardware or software component to consistently
perform according to its specifications. High Availability (HA) and reliability in cloud computing
services are some of the hot challenges. The probability that a system is operational in a time interva l
without any failures is represented as the system reliability.

4. Performance:
The accomplishment of a given task measured against pre-set known standards of accuracy,
completeness, cost, and speed. It is the measure How well a person, machine, etc. does a piece of
work or an activity seamlessly. Cloud computing is an area where performance is ultimate ly
important. It is important to have good performance for the core processes of moving data from a
client's operations to a vendor's cloud environment, and vice versa.

5. Pay-as-you-go:
A system of paying for something as expenses are incurred rather than in advance, and therefore not
allowing for debts to build up. It is the system in which a person or organization pays for the costs
of something when they occur rather than before or afterwards. Pay-as-you-go cloud computing
(PAYG cloud computing) is a payment method for cloud computing that charges based on usage.
The practice is similar to that of utility bills, using only resources that are needed. One major benefit
of the pay-as-you-go method is that there are no wasted resources, since users only pay for services
procured, rather than provisioning for a certain amount of resources that may or may not be used.
6. Programmability:
Programmability is the ability of a computer or a machine to accept instructions to do a range of
tasks, rather than just one easily. The capability within hardware and software to change, to accept
a new set of instructions that alter its behaviour. Programmability generally refers to program logic
(business rules), but it also refers to designing the user interface which includes the choices of
menus, buttons and dialogs.

7. Manage Large Amount of Data:


Big data refers to voluminous, large sets of data whereas cloud computing refers to the platform for
accessing large sets of data. In other words, big data is information while cloud computing is the
means of getting information. Big Data is a terminology used to describe huge volume of data and
information.

8. Efficiency:
The state or quality of being efficient, or able to accomplish something with the least waste of time
and effort; competency in performance. Cloud computing is a new approach to IT infrastructure and
a logical step on a path to more efficient use of computing resources. Business enterprises can
transform their business models and gain a competitive edge through early adoption of cloud
computing technologies.

9. Scalability & Elasticity:


Scalability is the ability of a system to increase the workload on its current hardware resources
(scale up) and elasticity is the ability of a system to increase the workload on its current and
additional (dynamically added on demand) hardware resources (scale out). Elasticity is strongly
related to deployed-on-cloud applications. In cloud computing, elasticity is defined as "The degree
to which a system is able to adapt to workload changes by provisioning and de-provisioning
resources in an autonomic manner, such that at each point in time the available resources match the
current demand as closely as possible."
REQUIREMENTS TO TRANSFER INFORMATION TECHNOLOGY TO A SERVICE

1. Internet:
The Internet (portmanteau of interconnected network) is the global system of interconnec ted
computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a
network of networks that consists of private, public, academic, business, and government networks
of local to global scope, linked by a broad array of electronic, wireless, and optical networking
technologies. The Internet carries a vast range of information resources and services, such as the
inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail,
telephony, and file sharing. It is a means of connecting a computer to any other computer anywhere
in the world via dedicated routers and servers. When two computers are connected over the Internet,
they can send and receive all kinds of information such as text, graphics, voice, video, and computer
programs.

Fig: Internet

The Internet began in 1969 as a research project funded by the Department of Defence with a goal
of creating a means of communication beside telephone lines. The first network was called
ARPANET (Advanced Research Project Agency Network). The focus was on communicating in the
event part of the network was disabled. This early network was the precursor to the Internet. It was
limited in function but launched the idea of a different method of communication.

2. Web 2.0:
Web 2.0 is the name used to the describe the second generation of the world wide web, where it
moved static HTML pages to a more interactive and dynamic web experience. Web 2.0 is focused
on the ability for people to collaborate and share information online via social media, blogging and
Web-based communities. Web 2.0 signalled a change in which the world wide web became an
interactive experience between users and Web publishers, rather than the one-way conversation that
had previously existed. It also represents a more populist version of the Web, where new tools made
it possible for nearly anyone to contribute, regardless of their technical knowledge.
Over time Web 2.0 has been used more as a marketing term than a computer-science-based ter.
Familiar examples of Web 2.0 sites and tools include wikis and blogs (PB works and WordPress),
social networking sites (Facebook and Twitter), image and video hosting sites (Flicker and
YouTube), and applications to generate Web content for education, business, and social purposes
(Wikipedia, Weebly and Instagram).

Fig: Web 2.0

Some Advantages of Web 2.0 are:


• Available at any time, any place.
• Variety of media.
• Ease of usage.
• User friendly.
• Provides real-time discussion.
• Can create dynamic learning communities.
• Learners can actively be involved in knowledge building.
• Updates in wiki are immediate and it offers more sources for researchers.
• Everybody is the author and the editor, every edit that has been made can be tracked.

3. Fault-Tolerance:
Fault tolerance is a major concern to guarantee availability and reliability of critical services as well
as application execution. This is the property that enables a system to continue operating properly
in the event of the failure of (or one or more faults within) some of its components. Hardware fault
tolerance is the ability of a component or subsystem to continue to be able to undertake the required
safety instrumented function in the presence of one or more dangerous faults in hardware.

In order to minimize failure impact on the system and application execution, failures should be
anticipated and pro-actively handled. Fault tolerance techniques are used to predict these failure and
take an appropriate action before failures actually occur. The importance of implementing a Fault
Tolerance System is about service continuity or maintaining functionality in the event of system
failure though operating speed might be affected. Fault Tolerance System is highly needed in most
enterprise organization especially for life-critical systems to continue providing service.
Existence of Fault Tolerance in Cloud Computing:
• System Failure: This may be either software or hardware issue. The software failure results
in system crash or hanging situation that may be due to stack overflow or other reasons. Any
improper maintenance of the physical hardware machines will result in hardware system
failure.
• Security Breach Occurrences: There are several reasons why fault tolerance occurs due to
security failures. The hacking of the server negatively impacts the server and results in data
breach. Other reasons for the necessity of fault tolerance in the form of security breaches
include ransomware, phishing, virus attack etc.

4. Parallel / Distributed Programming:


A concurrent programming language is defined as one which uses the concept of simultaneous ly
executing processes or threads of execution as a means of structuring a program. In parallel
computing, in order to exchange information all processors have access to a shared memory. A
parallel language is able to express programs that are executable on more than one processor.

Fig: BPSCloud system architecture

In distributed computing, each processor owns a separate memory and the information is exchanged
by passing messages between the processors. Distributed applications (distributed apps) are
applications or software that runs on multiple computers within a network at the same time and can
be stored on servers or with cloud computing.

5. Utility Computing:
Utility computing is a model in which computing resources are provided to the customer based on
specific demand. The service provider charges exactly for the services provided, instead of a flat
rate. The foundational concept is that users or businesses pay the providers of utility computing for
the amenities used – such as computing capabilities, storage space and applications services. The
customer is thus, absolved from the responsibility of maintenance and management of the hardware.
Consequently, the financial layout is minimal for the organization.

The term utility refers to utility services such as electricity, telephone, water and gas that are
provided by a utility company. For most clients, the biggest advantage of utility computing is
convenience. The client doesn't have to buy all the hardware, software and licenses needed to do
business. Instead, the client relies on another party to provide these services. Utility computing helps
eliminate data redundancy, as huge volumes of data are distributed across multiple servers or
backend systems. The client however, can access the data anytime and from anywhere.

6. Programming Model:
Cloud computing integrates vast computing and/or storage resources together, which provides
services on demand via networks. Developers request resources on demand and pay for it by hours.
Developers can also increase or decrease resources according to their demand. Cloud computing
provides convenience for application development and run. Meanwhile, it brings new challenges for
cloud computing programming models. Research on cloud computing programming models has
made some progress, such as Google’s MapReduce [1] and Microsoft’s Dryad [2]. However, there
are still some issues to be further studied. Firstly, the current cloud computing programming models
mainly focus on processing mass data. Computation intensive and I/O intensive applicatio n
programming on cloud computing have been a new topic. Secondly, when one programming a cloud
application, it’s very important for the programmer to rely on a simple yet realistic cost model.
BSPCloud is a programming model for cloud computing, and its goal is to provide a programming
model whose performance can be predicted.

Fig: BPSCloud system architecture

7. Storage Technologies:
Cloud computing is actually one kind of distributed computing, the aim of which is to make the
ultra-large-scale computing ability integrate with the storage resources through the internet, and to
provide the computing ability and storage resources to the users as reliable services by their needs.
However, cloud storage of high performance is the basic condition for cloud computing service .
almost all of the services based on cloud computing need the high-performance cloud storage to
satisfy the data processing needs. So, the cloud storage has become a research hotspot in the
information storage field.

The cloud storage platform infrastructure includes 4 layers. From bottom to top the layers are:
• Data storage layer
• Data management layer
• Application interface layer and
• User
8. Virtualization Technologies:
Virtualization is the creation of virtual servers, infrastructures, devices and computing resources. A
great example of how it works in your daily life is the separation of your hard drive into different
parts. While you may have only one hard drive, your system sees it as two, three or more different
and separate segments. The cloud often includes virtualization products as a part of their service
package. The difference is that a true cloud provides the self-service feature, elasticity, automated
management, scalability and pay-as-you-go service that is not inherent to the technology.

Types of Virtualization in Cloud Computing are:


• Data Virtualization
• Network Virtualization
• Storage Virtualization
• Desktop Virtualization
• Server Virtualization
• Application Virtualization

S-ar putea să vă placă și