Cloud Computing Notes
Unit 1: Introduction to Cloud Computing
Cloud computing is a model that allows on-demand access to a shared pool of computing resources
such as servers, storage, databases, networking, and software. The key characteristics include:
- On-demand self-service
- Broad network access
- Resource pooling
- Rapid elasticity
- Measured service
Types of Cloud Computing:
1. Public Cloud: Available to the general public (e.g., AWS, Azure, Google Cloud).
2. Private Cloud: Dedicated to a single organization.
3. Hybrid Cloud: Combination of public and private clouds.
4. Community Cloud: Shared infrastructure for a specific community.
Unit 2: Cloud Service Models
There are three main cloud service models:
1. **Infrastructure as a Service (IaaS)**: Provides virtualized computing resources over the internet
(e.g., Amazon EC2, Google Compute Engine).
2. **Platform as a Service (PaaS)**: Provides a platform to develop, test, and deploy applications
(e.g., Google App Engine, Microsoft Azure App Services).
3. **Software as a Service (SaaS)**: Delivers software applications over the internet (e.g., Google
Docs, Dropbox, Salesforce).
Unit 3: Cloud Deployment Models
Cloud deployment models define how cloud services are implemented:
1. **Public Cloud**: Services provided by third-party vendors accessible to anyone.
2. **Private Cloud**: Infrastructure maintained for a single organization.
3. **Hybrid Cloud**: Integration of public and private clouds for flexibility.
4. **Community Cloud**: Shared by multiple organizations with similar needs.
Unit 4: Virtualization in Cloud Computing
Virtualization allows multiple virtual instances to run on a single physical machine. Types include:
- Server Virtualization (VMware, Hyper-V)
- Storage Virtualization
- Network Virtualization
Hypervisors (Type 1 and Type 2) play a key role in managing virtual machines.
Unit 5: Cloud Security and Challenges
Cloud security is crucial to protect data and applications. Major concerns include:
- Data breaches
- Unauthorized access
- Compliance issues
Security solutions include encryption, multi-factor authentication, and intrusion detection systems.