Cloud Computing Solutions
Здесь есть возможность читать онлайн «Cloud Computing Solutions» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:Cloud Computing Solutions
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:3 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 60
- 1
- 2
- 3
- 4
- 5
Cloud Computing Solutions: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cloud Computing Solutions»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
The main purpose of this book is to include all the cloud-related technologies in a single platform, so that researchers, academicians, postgraduate students, and those in the industry can easily understand the cloud-based ecosystems.
Audience
Cloud Computing Solutions — читать онлайн ознакомительный отрывок
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cloud Computing Solutions», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:

This edition first published 2022 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2022 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
Wiley Global Headquarters
111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchant-ability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 978-1-119-68165-6
Cover image: Pixabay.ComCover design by Russell Richardson
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines
Printed in the USA
10 9 8 7 6 5 4 3 2 1
Dedicated to our friends
and family for their
constant support during the
course of this book
List of Figures
1 1.1 Evolution of cloud computing.
2 1.2 Architecture of computer cluster.
3 1.3 Schematic diagram of distributed system.
4 1.4 Peer-to-peer communication scenario.
5 1.5 Scenario of global grid consisting of cluster and enterprise grid.
6 1.6 Schematic diagram of layered grid architecture.
7 1.7 Mobile computing.
8 2.1 Characteristics of cloud.
9 2.2 Cloud service model.
10 2.3 Infrastructure as a service (IaaS).
11 2.4 Platform as a service (PaaS).
12 2.5 Software as a service (SaaS).
13 3.1 Life cycle of SOA.
14 3.2 Architecture of cloud computing environment.
15 4.1 Virtual machine scenario.
16 4.2 System virtual machine.
17 4.3 Process virtual machine.
18 4.4 Virtualization model for cloud computing.
19 4.5 Operation performed to implement full virtualization at the kernel level.
20 4.6 Operation performed to implement paravirtualization virtualization at the kernel level.
21 4.7 Operation performed to implement hardware-assisted virtualization at the kernel level.
22 5.1 Schematic diagram of classification of virtualization environment.
23 5.2 Schematic diagram of migration process.
24 5.3 A scenario of operating system-based virtualization.
25 5.4 A scenario of application-based virtualization.
26 5.5 A scenario of hypervisor-based virtualization.
27 6.1 Live migration architectural workflow.
28 6.2 Schematic diagram of security issues during live migration.
29 7.1 Cloud computing magnet.
30 8.1 An overview of a MongoDB cluster.
31 8.2 CAP theorem.
32 9.1 Hadoop distributed file system architecture.
33 9.2 Hadoop distributed file system reading process.
34 9.3 Hadoop distributed file system write process.
35 9.4 MapReduce procedure.
36 9.5 Applications run natively in Hadoop.
37 9.6 Hadoop 1 verus Hadoop 2 w/YARN.
38 9.7 YARN architecture.
39 9.8 ApplicationMaster.
40 10.1 Auditing classification.
41 10.2 Schematic diagram of auditing concept.
42 10.3 Cloud auditing service.
43 10.4 Transaction between cloud server and auditor: generation of security tags between TPA and cloud storage during auditing.
44 11.1 Third-party enabling auditing services.
45 11.2 Cloud computing economics.
46 12.1 Taxonomy tree for disease.
47 12.2 Flowchart of genetic algorithm.
48 13.1 Combination of cloud computing and wireless sensor networks.
49 14.1 Mobile cloud computing.
50 14.2 The architecture of mobile cloud computing.
51 14.3 The difference between cloud computing and mobile computing.
52 14.4 Mobile cloud applications.
53 15.1 The six Vs of big data.
54 15.2 Big data vs. cloud computing
55 16.1 Layered architecture of CloudSim simulator.
56 16.2 Class diagram of CloudSim.
57 16.3 Flow of communications among CloudSim entities.
58 17.1 OpenFaaS.
59 17.2 OpenFaaS architecture.
60 17.3 One host setup for the test cluster.
61 17.4 Multiple host setup for the test cluster.
62 17.5 Kubernetes OpenFaaS.
63 17.6 OpenShift client tools.
64 18.1 Sunstone login form.
65 18.2 Change password of oneadmin or other users.
66 18.3 Add worker node as host.
67 18.4 Apps that can be downloaded.
68 18.5 Available images that were downloaded.
69 18.6 VM templates.
70 18.7 Running VM.
71 18.8 Accessing the VM via VNC.
72 19.1 OpenStack architecture.
73 19.2 OpenStack object storage.
74 19.3 OpenStack logical architecture.
75 19.4 Hardware requirements.
76 19.5 Networking option 1: Provider networks.
77 19.6 Networking option 2: Self-service networks.
78 20.1 Eucalyptus architecture.
79 20.2 Eucalyptus components.
80 20.3 Eucalyptus services placement.
List of Tables
1 1.1 A comparison-based study of cluster, grid and cloud.
2 2.1 Shared responsibility model for security of cloud computing.
3 3.1 Workflow tools in cloud computing.
4 4.1 Traditional computing vs. cloud computing.
5 8.1 A comparison of ACID-based and NoACID-based cloud databases.
6 10.1 Auditing algorithms and services.
7 12.1 Comparative analysis of strengths and limitations of some of the existing security schemes.
8 19.1 OpenStack vs. AWS.
Foreword
This book discusses the evolution of cloud computing through grid computing and cluster computing. The main purpose of this book is to include all the cloud-related technologies in a single platform, so that undergraduate and postgraduate students, researchers, academicians, and those in industry can easily understand the cloud-based ecosystems. This book will take the reader on a journey that begins with understanding the cloud infrastructure paradigm in cloud-enabled technologies and how it can be applied in various ways. It will help researchers and practitioners to understand grid and distributed computing, cloud infrastructure, virtual machine, virtualization, live migration, scheduling techniques, auditing concept, security and privacy, business models, and case studies through the state-of-the-art in cloud computing countermeasures.
Читать дальшеИнтервал:
Закладка:
Похожие книги на «Cloud Computing Solutions»
Представляем Вашему вниманию похожие книги на «Cloud Computing Solutions» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «Cloud Computing Solutions» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.