Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Individual report Individual Demonstration, Assignments of Java Programming

Data ManagementComputer ScienceNetwork SecurityInformation Technology

Definitions of: data types (the role of constants/variables), methods (including input/output), control structures, iteration, scope, parameter passing, classes, inheritance and events. Key components of an IDE with a brief explanation each component. Developing simple applications which implements basic algorithms using the features of a suitable language and IDE Documentation of the debugging process in the IDE, with reference to watch lists, breakpoints and tracing. defects and bugs in their

What you will learn

  • What are the five essential characteristics of cloud computing?
  • Why should ATN consider using cloud computing?
  • What are the deployment options for MongoDB?
  • What are the benefits of using a public cloud for a business?
  • How does multi-tenancy and resource pooling work in cloud computing?

Typology: Assignments

2021/2022

Uploaded on 07/12/2022

thuannguyen24
thuannguyen24 🇻🇳

4.5

(5)

6 documents

1 / 27

Toggle sidebar

Related documents


Partial preview of the text

Download Individual report Individual Demonstration and more Assignments Java Programming in PDF only on Docsity! 1 ASSIGNMENT 1 FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 16: Cloud computing Submission date Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Nguyen Huu Tien Thuan Student ID GCH200358 Class GCH0907 Assessor name Do Quoc Binh Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Thuan Grading grid P1 P2 P3 P4 M1 M2 D1 2  Summative Feedback:  Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Signature & Date: 5 Table Figure Figure 1: Client/Server .................................................................................................................................................. 6 Figure 2:Peer to peer .................................................................................................................................................... 7 Figure 3: Parallel ........................................................................................................................................................... 9 Figure 4:Cluster ........................................................................................................................................................... 10 Figure 5: Distributed ................................................................................................................................................... 11 Figure 6:Public cloud ................................................................................................................................................... 12 Figure 7:Private cloud ................................................................................................................................................. 13 Figure 8:Community cloud .......................................................................................................................................... 14 Figure 9:Hybrid cloud .................................................................................................................................................. 15 Figure 10:IaaS .............................................................................................................................................................. 16 Figure 11:SaaS ............................................................................................................................................................. 17 Figure 12:PaaS ............................................................................................................................................................ 18 Figure 13:Characteristic of cloud ................................................................................................................................ 20 Figure 14: Virtualization .............................................................................................................................................. 21 6 I. Introduction The storage and access of data and computer services through the internet is referred to as cloud computing. It does not save any information on your computer. It refers to the availability of computer services such as servers, data storage, networking, databases, and so on demand. The basic goal of cloud computing is to provide numerous users with access to data centers. Data from a distant server can also be accessed by users. (Peterson, 2022) Cloud computing is broadening the scope of information technology in general. The concept of cloud computing, as well as the models offered by IT service providers, will be discussed in the following study. It has several advantages over traditional approaches, including cheaper costs and greater flexibility. Individuals, organizations, educational institutions, and governments are all using cloud computing because of its immense potential. II. Client-Server 1. Definition In client server computing, clients make a request and the server provides a response to that request by the client. A server can serve multiple clients at a time while the client is exposed to only one server. The client and the server communicate over a computer network but can be on the same system. (Meador, 2018) 2. Characteristics of Client Server Computing A request and response mechanism is used in client-server computing. The client makes a request to the server, which the server fulfills by providing the requested information. Figure 1: Client/Server 7 The client and server should use the same communication protocol to make it easier for them to communicate with one another. At the application layer, all communication protocols are available. A server can only handle a certain amount of client requests at any given moment. As a result, it responds to requests using a priority-based method. - Pros: A server in client-server computing is a central node that serves a large number of client nodes. In a peer-to-peer system, on the other hand, the nodes pool their resources and interact with one another; The server is the node that connects with the other nodes in client- server computing. In peer-to-peer computing, all nodes are equal and share data directly with one another; Peer to peer computing is thought to be a subclass of client server computing. - Cons: If all of the clients request data from the server at the same time, the server may get overloaded. The network may get congested as a result of this; If the server goes down for whatever reason, none of the customers' requests will be completed. This causes the client- server network to fail; Setting up and maintaining a client-server paradigm is fairly expensive. III. Peer-to-peer (P2P) 1. Definition A peer-to-peer (P2P) service is a decentralized platform that allows two people to communicate directly with one another without the need for a third party to intervene. Instead, the buyer and seller use the P2P service to deal directly with one another. Search, screening, rating, payment processing, and escrow are some of the services that the P2P platform may offer. (Rosencrance, 2019) 2. Architecture of P2P Figure 2:Peer to peer 10 2.2. Types of cluster High performance cluster: To address advanced computational challenges, HP clusters employ computer clusters and supercomputers. They're used to completing tasks that require nodes to interact in order to complete. They're made to take use of several nodes' parallel processing capacity. (shubhikagarg1999, 2021) Load-balancing cluster: Incoming resource requests are split across numerous nodes that execute similar applications or have comparable content. This ensures that no single node receives an excessive amount of work. In a web-hosting environment, this sort of distribution is commonly utilized. High availability cluster: HA clusters are intended to include redundant nodes that may serve as backup systems in the event of a breakdown. Customers may expect consistent computing services such as corporate operations, complex databases, and consumer services such as e- websites and network file distribution. They're made to ensure that customers have access to data at all times. 2.3. Cluster computing architecture It is built with a network of interconnected individual computers that operate as a single standalone system. It's a collection of workstations or computers connected by high-speed interconnects to form a single, integrated computing resource. A node is a single or multiprocessor network that includes memory, input and output operations, as well as an operating system. A single line connects two or more nodes, or each node can be linked individually through a LAN connection. 3. Distributed Figure 4:Cluster 11 3.1. Definition A distributed system is a group of servers and data storage that are physically separated and located in different systems throughout the world. These components may communicate, coordinate, and work together to achieve a common goal, creating the illusion of a single, unified system with significant processing capabilities. Distributed systems include distributed computer servers, databases, software applications, and file storage systems. (Gibb, 2019) V. Deployment models Based on ownership, scale, and access, as well as the cloud's nature and purpose, the cloud deployment model determines the unique sort of cloud environment. A cloud deployment paradigm determines where your servers are located and who has authority over them. Different types of cloud computing deployment models are: - Public cloud - Private cloud - Community cloud - Hybrid cloud 1. Public cloud The public cloud is an IT architecture in which a third-party supplier manages on-demand computing services and infrastructure that is shared among different enterprises over the public Internet. (javapoint, n.d.) Figure 5: Distributed 12 Public cloud service providers may charge consumers a monthly or per-use fee for cloud-based services such as infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (Saas), removing the need for users to host these services on-site in their own data center. A public cloud is a virtualized environment that extends a company's IT infrastructure by allowing it to host some components of its infrastructure and services on virtual servers that are hosted offsite and owned by a third party. Different capabilities distinguish public cloud service providers, and they provide a diverse range of services and pricing methods. Pros Cons Cost saving Security and compliance concerns Less server management Vendor lock-in Security Example: Amazon Web Service, commonly known as AWS, is a cloud services platform that offers cloud computing infrastructure, database storage, bandwidth, API support, and content delivery, along with several IaaS and PaaS services. A few notable services of AWS include Elastic Compute Cloud (EC2), Glacier storage, Relational Database Service (RDS), Simple Storage Service (S3), Elastic Beanstalk, DynamoDB NoSQL database, and Elastic Block Store (EBS). It also offers cloud services related to networking, analytics and machine learning, the internet of things (IoT), mobile services, development, cloud management, cloud security, and more. 2. Private cloud Figure 6:Public cloud 15 4. Hybrid cloud A hybrid cloud is a computer environment that combines public and private clouds to provide a cohesive, automated, and well-managed system. Non-critical operations are handled by the public cloud, while critical activities are handled by the private cloud in a hybrid cloud. Pros Cons Flexible and secure Networking issues Cost effective Infrastructure compatibility Security Reliability Risk management Example On-premises security meets cloud flexibility in the financial services industry: the private cloud can be used to process trade orders and store sensitive client and company information. The public cloud could then be used for hosting less important or less sensitive applications of your business, giving you the adaptability you need. While I personally believe that public clouds have the ability to provide the same level of security as private clouds, it is clear that many in the financial services sector do not or cannot rely on the public cloud for critical data and transactions. VI. Service modes 1. Infrastructure as a service(IAAS) Infrastructure as a Service (IaaS) refers to cloud infrastructure services that are made up of highly scalable and automated computational resources. Computers, networking, storage, and other Figure 9:Hybrid cloud 16 services may all be accessed and monitored via IaaS. Instead of purchasing hardware altogether, IaaS allows organizations to acquire resources on-demand and as-needed. (Boisvert, 2020) IaaS users connect to resources and services across a wide area network (WAN), such as the internet, and then use the cloud provider's services to complete the application stack. Any cloud computing paradigm necessitates the involvement of a provider. A third-party entity that specializes in selling IaaS is frequently the supplier. Independent IaaS providers include Amazon Web Services (AWS) and Google Cloud Platform (GCP). A company might even set up its own private cloud and become its own infrastructure provider. Pros Cons Maintaining on-premise IT infrastructure may be expensive and time-consuming, as it frequently necessitates a large upfront investment in physical gear. You'll almost certainly need to hire competent IT specialists to repair the gear and keep things running smoothly. Legacy systems: Any legacy technology or apps should be examined for compatibility before a full cloud migration is performed. Many older systems were not built to handle cloud-based services and may need to be modified or replaced. It reclaims control over the infrastructure for you. You will no longer need to place trust in an external IT contractor — you can access and oversee IaaS products Security: When moving from on-premise to cloud, new security dangers may emerge, whether from the host or other virtual machines (VMs). Organizations Figure 10:IaaS 17 yourself if you wish, without being an IT wiz. must examine and investigate current security risks as well as their remediation techniques. IaaS solutions are extremely adaptable and expandable, and they can be updated at any time without losing money on your initial investment. Internal Training: When a new system is implemented, there is a lack of familiarity with its complexities. Additional training and materials should be prepared by businesses to ensure that their users understand what they are doing. Example of popular IaaS provider include: Google Computer Engine (GCE); Microsoft Azure; AWS EC2;… 2. SAAS SaaS is a software distribution paradigm in which a cloud provider hosts programs and makes them available to end customers through the internet. An independent software vendor (ISV) may hire a third-party cloud provider to host the application in this manner. Or, in the case of larger corporations like Microsoft, the cloud provider may also be the software supplier. (Chai, 2021) Pros Cons Flexible payments. Customers subscribe to a SaaS solution rather than acquiring software to install or additional infrastructure to support it. Many organizations may improve and forecast their budgeting by converting expenditures to a recurrent operational Issues that are beyond the customer's control. When providers have service outages, make unwelcome modifications to service offerings, or suffer a security breach, problems might occur, all of which can have a significant impact on consumers' ability to use the SaaS Figure 11:SaaS 20 There are basically 5 essential characteristics of cloud computing. 1. On-demand self-service Human administrators are not required for cloud computing services; users may deploy, monitor, and manage computer resources as needed. 2. Broad network access Computing services are often delivered over regular networks and a variety of devices. 3. Multi-tenancy and resource pooling IT resources for computing services should be able to expand out and in rapidly and on an as-needed basis. When a user requests services, they are given, and the service is scaled down after the user's needs are met. 4. Rapid elasticity The IT resource (e.g., networks, servers, storage, applications, and services) is shared in an uncommitted way between different applications and occupants. A single physical resource is used to serve several customers. 5. Measured service For each application and occupant, resource use is recorded, giving both the user and the resource supplier an account of what has been consumed. This is done for a variety of purposes, including invoicing and resource management. VIII. Virtualization and Multicore 1. Virtualization Virtualization in operating systems transforms a standard operating system so that it may run a variety of apps that can be shared by several users on a single computer machine. The operating system may seem differently to each user, and each of them may feel they are dealing with the only operating system; yet this has no effect on the user's experience. Figure 13:Characteristic of cloud 21 A process can also be migrated from one instance of the operating system to another using operating system virtualization. However, all of the system's processes are segregated, and their operations are closely monitored, ensuring that there are no inconsistencies. A diagram representing operating system virtualization Pros Cons Virtualization makes it simple to share a limited amount of hardware resources to several programs that require them. A virtualized system need the use of specialized professionals to set up and maintain. This necessitates the hiring of virtualization expertise and raises prices. The use of virtualization can help to improve security. This occurs because each process runs in its own operating system instance and operates independently. Virtualization comes with a slew of upfront fees. These costs include both the virtualization software and the extra hardware needed. The expenses are also determined by the current system network. For setting up a virtual hosting environment, operating system virtualization is quite beneficial. Operating system virtualization is particularly useful because there is just a small overhead involved. 2. Multicore Figure 14: Virtualization 22 A multicore processor is an integrated circuit with two or more processing cores for better performance and lower power consumption. Parallel processing and multithreading, for example, offer more efficient simultaneous execution of several tasks on these processors. On a computer, a dual core configuration is analogous to having several, separate CPUs installed. The connection between the two CPUs is faster since they are hooked into the same socket. Multicore processors, often known as microprocessors, are one way to improve processor performance without going beyond the realistic limits of semiconductor design and production. Multicore technology also ensures safe operating in areas like heat generation. IX. Propose a cloud solution for ATN company ATN is a Vietnamese corporation that sells toys to teens in a number of areas around the country. The firm generates over $700,000 in annual income. At the moment, each shop has its own database for storing transactions specific to that shop. Each store is required to transmit sales data to the board director on a monthly basis, and the board director requires a significant amount of time to compile the data from all of the shops. Aside from that, the board is unable to view real-time stock information updates. 1. Why ATN should use cloud As the scenario shows, the company ATN has quite large annual revenue, and the data system is also very large. Supply management takes a lot of time to gather data. Based on this scenario, ATN should use cloud computing because: The first is the cloud for collaboration: The cloud enables work to be accessed from multiple devices and from anywhere, thus making it much easier for teams to collaborate on shared data. From there, the manager can easily manage all data of all branches, just the manager has an internet connection. Secondly, Cloud benefits are measurable and pay for themselves: Leading firms can quantify considerable advantages from their cloud investments, ranging from increased efficiency to enhanced employee mobility, but they can also time their investments to avoid large upfront capital expenditures and pay monthly as their business grows. ATN will only need to pay for the services they purchase. IT won't take long to install new hardware and software and reconfigure equipment. It provides everyone with the same technology platform, helping everyone operate on the same platform. Furthermore, the service fee is based on storage capacity, storage capacity and number of users, time and storage capacity. Therefore, ATN can easily choose its budget to save costs. If your data is overloaded, you can easily get more storage and upgrade your plan. Last but not least is security, cloud computing services provide the highest level of resiliency. Users may securely access data and apps in the cloud no matter where they are or what device they are using if the correct cloud security measures are in place. More and more businesses are seeing the benefits of transferring their systems to the cloud. Cloud computing enables businesses to operate at scale, cut technological expenses, and leverage flexible systems to gain a competitive advantage. 25 • Getting started quickly: MongoDB has a great user experience for developers who can install MongoDB and start writing code immediately. 3.3. Which cloud platform should be used? Heroku is a cloud-based Platform-as-a-Service (PaaS) that allows software developers to create and execute complicated web apps without having to worry about the underlying hardware or networking. Some of the reasons we should apply Heroku to our project are: • Deploy from difference sources: Git-based deployment is Heroku's primary choice. When you push code into master, you may "link" your app directly from GitHub and activate automatic deployment (Heroku will be listening on this branch). It also offers a git option (Heroku git), which you may use as your repository. In addition to these choices, you may use Docker Container Registry within Heroku to deploy, which is ideal for projects that already have an image. • Allows the developer to focus on code instead of infrastructure • Offers a powerful dashboard and CLI • Support form Modern Open Source Languages • This cloud computing platform takes care of patching systems and keeping everything healthy. 4. Cloud architecture The dynamic scalability architecture is an architectural concept that is based on a set of specified scaling conditions that cause the dynamic allocation of IT resources from resource pools. Because superfluous IT resources are efficiently reclaimed without needing user engagement, dynamic allocation permits flexible utilization as determined by consumption demand changes. (Seshachala, 2015) Workload thresholds are set in the auto scaling listener, indicating when new IT resources should be added to the workload handle. Based on the conditions of a certain cloud consumer supply contract, this method can be equipped with logic that determines the amount of extra IT resources that can be dynamically provisioned. The initial cloud service consumers, as shown in the diagram, are submitting queries to a cloud service. The automated scaling listener checks the cloud service in the following phase to see whether the specified capacity threshold has been surpassed. There will be two scenarios to consider. 26 Case 1: If the workload does not exceed the power threshold throughout this process. The request will be delivered to the cloud service as normal if the workload is less than or equal to the capacity threshold. If the workload is three and the production threshold is four, the request will be routed to the cloud service to continue processing. Case 2: The amount of service requests coming from cloud service users, on the other hand, is growing. The workload has beyond the performance barrier. Based on a preset scaling strategy, the scaling listener automatically chooses the next course of action. - If the cloud service implementation is determined appropriate for extra scalability, the scaling listener will start the scaling process right away. - The scaling listener then automatically transmits the signal to the resource duplication system, which generates several copies of the cloud service to suit the increased demand. - The automated listener continues to monitor and assess and add IT resources as needed now that the higher workload has been given. The user's request will be returned or terminated if the cloud translation implementation does not qualify for extra scalability. X. Conclusion Cloud computing is becoming more popular all around the world. The overarching purpose is to engage and progress every business strategy. With this in mind, we've devised a strategy with arguments and justifications for why we should choose cloud computing over traditional data management methods. References 27 Peterson, R., 2022. What is Cloud Computing?. [online] guru99.com. Available at: <https://www.guru99.com/what-is-cloud-computing-with-example.html> [Accessed 5 June 2022]. Meador, D., 2018. Client Server Computing. [online] tutorialspoint.com. Available at: <https://www.tutorialspoint.com/Client-Server-Computing> [Accessed 5 June 2022]. Peterson, R., 2022. What is Cloud Computing?. [online] guru99.com. Available at: <https://www.guru99.com/what-is-cloud-computing-with-example.html> [Accessed 5 June 2022]. universedecoder, 2021. Introduction to Parallel Computing. [online] geeksforgeeks.org. Available at: <https://www.geeksforgeeks.org/introduction-to-parallel-computing/> [Accessed 9 June 2022]. shubhikagarg1999, 2021. An Overview of Cluster Computing. [online] geeksforgeeks.org. Available at: <https://www.geeksforgeeks.org/an-overview-of-cluster-computing/> [Accessed 9 June 2022]. javapoint, n.d. Public Cloud. [online] javatpoint.com. Available at: <https://www.javatpoint.com/public- cloud> [Accessed 10 June 2022]. Lutkevich, B., 2022. What is a private cloud?. [online] techtarget.com. Available at: <https://www.techtarget.com/searchcloudcomputing/definition/private-cloud> [Accessed 10 June 2022]. javapoint, n.d. Community Cloud. [online] javatpoint.com. Available at: <https://www.javatpoint.com/community-cloud> [Accessed 10 June 2022]. Boisvert, M., 2020. Infrastructure as a Service (IaaS). [online] techtarget.com. Available at: <https://www.techtarget.com/searchcloudcomputing/definition/Infrastructure-as-a-Service-IaaS> [Accessed 10 June 2022]. Seshachala, S., 2015. Cloud Computing Architecture: an Overview. [online] https://cloudacademy.com/. Available at: <https://cloudacademy.com/blog/cloud-computing-architecture-an-overview/> [Accessed 13 June 2022].
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved