How is the Cloud Computing different from primitive Client-Server Architecture?

cloud computing vs traditional client server

The primitive Client-Server architecture is a one-to-one communication between only two physical machines namely Client machine and Server machine (datacenter). Whereas the cloud computing, infrastructure is similar at the client side but varies at server-side. The server-side contains a main Cloud Controller that forwards the request to its worker machines known as Nodes. These nodes are a grid computing machines that dedicate all its resources to process application. These nodes are maintained in clusters. So a cloud computing infrastructure is quite complicated on server side that processes all the requests from clients and send the result back.

What is the difference between traditional datacenters and cloud?

Cloud computing uses the concept of datacenter as it is the datacenter is based on the tradition one so the difference between them are as follows:

• Cost of the traditional datacenter is higher, due to heating issues and other hardware/software related issues but this is not the case with the cloud computing infrastructure.
• It gets scaled when the demand increases. Most of the cost is being spent on the maintenance being performed on the datacenters, whereas cloud platform requires minimum maintenance and not very expert hand to handle them.

What essential things to know before going for cloud computing platform?

A user should know some parameters by which he can go for the cloud computing services. The parameters are as follows:
1. User should know the data integrity in cloud computing: It is a measure to ensure integrity like the data is accurate, complete and reasonable.
2. Compliance: user should make sure that proper rules and regulations are followed while implementing the structure.
3. Loss of data: user should know about the provisions that are provided in case of loss of data so that backup and recovery can be possible.
4. Business continuity plans: user should think about does the cloud services provide him uninterrupted data resources.
5. Uptime: user should know about the uptime the cloud computing platform provides and how helpful it is for the business.
6. Data storage costs: user should find out about the cost which you have to pay before you go for cloud computing.

What does software as a service provide in Cloud Computing?

Software as Service is another layer of cloud computing, which provides cloud applications like google is doing, it is providing google docs for the user to save their documents on the cloud and create as well. It provides the applications to be created on fly without adding or installing any extra software component. It provides built in software to create wide varieties of applications and documents and share it with other people online.

How important is platform as a service in Cloud Computing?

Platform as a Service is an important layer in cloud architecture. It is built on the infrastructure model, which provides resources like computers, storage and network. This layer includes organizing and operate the resources provided by the below layer. It is also responsible to provide complete virtualization of the infrastructure layer to make it look like a single server and keep it hidden from the outside world.

What are the different layers of cloud computing?

Cloud computing consists of 3 layers in the hierarchy and these are as follows:

1. Infrastructure as a Service (IaaS) provides cloud infrastructure in terms of hardware like memory, processor speed etc.
2. Platform as a Service (PaaS) provides cloud application platform for the developers.
3. Software as a Service (SaaS) provides cloud applications which are used by the user directly without installing anything on the system. The application remains on the cloud and it can be saved and edited in there only.

What is S3 in AWS ? What is it used for?

S3 stands for Simple Storage Service. You can think of it like ftp storage, where you can move files to and from there, but not mount it like a filesystem. AWS automatically puts your snapshots there, as well as AMIs (Amazon Machine Image) there. Encryption should be considered for sensitive data, as S3 is a proprietary technology developed by Amazon themselves, and as yet unproven vis-a-vis a security standpoint.

What are the security laws which are implemented to secure data in a cloud ?

The security laws which are implemented to secure data in cloud are

  • Processing: Control the data that is being processed correctly and completely in an application
  • File: It manages and control the data being manipulated in any of the file
  • Output reconciliation: It controls the data which has to be reconciled from input to output
  • Input Validation: Control the input data
  • Security and Backup: It provides security and backup it also controls the security breaches logs

What is “ EUCALYPTUS” in Cloud Computing

“ EUCALYPTUS” stands for Elastic Utility Computing Architecture For Linking Your Programs To Useful Systems”

Use of “EUCALYPTUS” in cloud computing?

“Eucalyptus” is an open source software infrastructure in cloud computing, which is used to implement clusters in cloud computing platform. It is used to build public, hybrid and private clouds. It has the ability to produce your own data center into a private cloud and allows you to use its functionality to many other organizations.

What is the security aspects provided with cloud?

Security is one of the major aspects which come with any application and service used by the user. Companies or organizations remain much more concerned with the security provided with the cloud. There are many levels of security which has to be provided within cloud environment such as:
• Identity management: it authorizes the application service or hardware component to be used by authorized users.
• Access control: permissions has to be provided to the users so that they can control the access of other users who are entering the in the cloud environment.
• Authorization and authentication: provision should be made to allow the authorized and authenticated people only to access and change the applications and data.