🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 10 - 02 - Understand Cloud Computing Fundamentals - 05_ocred_fax_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Document Details

barrejamesteacher

Uploaded by barrejamesteacher

null

OCRED

Tags

cloud computing virtualization computer architecture

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Cloud Storage Architecture B...

Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Cloud Storage Architecture B B High Level Cloud St Architect: Cloud storage is a data storage medium used to e store digital data in logical pools using a network ‘ a ;] ;l — Front-End CN RO N ‘Public APIs for Data and Management J\ The cloud storage architecture consists of three N e Virtual Computer main layers namely, front-end, middleware, and ) Servers back-end g The Front-end layer is accessed by the end user Object Fie = Middleware where Pit provides 2 APIs for the management of Storage M Object ol Storage data storage The Middleware layer performs several functions Logical Storage Pools such as data de-duplication and replication of l l ' data.. Physical St Se! Physical Storage (— Back-End @ The Back-end layer is where the hardware is ST ve— Servers implemented Cloud Service Location 1 Location n Cloud Storage Architecture Cloud storage is a medium used to store digital data in logical pools using a network. The physical storage is distributed to multiple servers, which are owned by a hosting company. Organizations can buy storage capacity from the cloud storage providers for storing user, organization, or application data. Cloud storage providers are solely responsible for managing the data and keeping the data available and accessible. Cloud storage services can be accessed using a cloud computing service, a web service API, or any applications that use the API, such as cloud desktop storage, cloud storage gateway, or web-based content management systems. The cloud storage service is operated from an off-premises service, like Amazon S3. The cloud storage architecture possesses the same characteristics as cloud computing in terms of scalability, accessible interfaces, and metered resources. It is built on highly virtualized infrastructure and relies on multiple layers to provide continuous storage services to users. The three main layers correspond to the front-end, middleware, and back-end. The front-end layer is accessed by the end-user and provides APIs for the management of data storage. The middleware layer performs functions such as data de-duplication and replication of data. The back-end layer is where the hardware is implemented. Cloud storage is made of distributed resources. It is highly fault-tolerant through redundancy, consistent with data replication, and highly durable. Widely used object storage services include Amazon S3, Oracle Cloud Storage and Microsoft Azure Storage, Open Stack Swift, etc. Module 10 Page 1326 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing High Level Cloud Storage Architecture sl 5l B Y Public APIs for Data and Management — Front-End J \ ]\ Virtual Computer Virtual Servers Computer Servers — Middleware Block, File or Object Storage 4Ea fa 4L Logical Storage Pools T J | — Back-End Physical Storage Servers Physical Storage Servers Cloud Service Location 1 Location n Figure 10.28: Cloud storage architecture Module 10 Page 1327 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Fog Computing L3 O Fog computing is a distributed and independent digital environment in which applications and data storage are positioned between data sources (devices generating data) and a cloud service QO It acts as an intermediary between the hardware and remote servers and is also called as an intelligent gateway O 1tis used for enhanced data processing, storage, and analysis in a quick and efficient manner Internet/cloud rog Compnting fi.................... Axchitecture H Gateway ff_ ! r loT devices Copyright © by EC- til All Rights Reserved. ReproductionIs Strictly Prohibited. Fog Computing The massive growth in loT devices worldwide has resulted in the production of an enormous amount of data by these devices. To meet the growing demand for analyzing and processing these data, the implementation of fog computing, along with cloud computing, is an ideal solution. Fog computing is a distributed and independent digital environment in which the applications and data storage are positioned between data sources (devices generating data) and the cloud service. Fog computing is an extended version of cloud computing that comprises multiple edge nodes that are directly connected to physical devices to enable service access to the end users. Generally, fog refers to the idea of creating an individual layer in distributed network infrastructure that has close inter-connections with 10T and cloud computing. It acts as an intermediary between the hardware and remote servers, and it is also called an intelligent gateway. Fog can be used for enhanced data processing, storage, and analysis in a quick and efficient manner. Many organizations have adopted this technology as it can provide additional functionalities for quick and efficient data processing, storage, and analysis. Working of Fog Computing Devices with an Internet connection, computational abilities, and data storage are referred to as nodes of fog. Fog nodes can be deployed anywhere in a network. The loT applications for fog nodes are ported at the network edge. The fog nodes close to the network edge take data from loT devices, enabling short-term analytics at the edge. Fog computing can be very beneficial in case of an unstable Internet connection. Urgent requests are transmitted directly into the fog and are processed in real time in the local network. Fog computing can be used in applications such as smart cities, smart grids, connected cars, and real-time analytics. Module 10 Page 1328 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Internet/cloud I; Gateway ; | N—— 7;_‘ IoT devices — AR Figure 10.29: Fog computing architecture Advantages: Fog computing has been beneficial in the field of 10T, big data, and real-time analytics. The following are the main advantages of fog computing over cloud computing. Low latency: Fog computing can process large volumes of data with no delay as the fog is geographically nearer to end users and can offer rapid responses. High business agility: Developers can easily and swiftly design fog instances and deploy them based on the requirement. No glitches with bandwidth: All the data are accumulated at distinct points, instead of being transmitted together to one center through a single channel, thereby avoiding bandwidth-related problems. No connection loss: The presence of several interconnected channels does not cause connection loss. Elevated security: Fog computing enhances security as the data processing is performed by numerous nodes in a complex distributed system. Low operating cost: Fog computing can drastically reduce cost through the conservation of network bandwidth as data are processed locally, instead of being sent to the cloud for analysis. High power efficiency: Edge devices run power-saving protocols such as Zighee, Z- Wave, or Bluetooth. Disadvantages: The following are some of the disadvantages of fog computing in comparison to cloud computing. Additional expenditures: Organizations must buy additional edge devices such as routers, hubs, and gateways. Module 10 Page 1329 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing = Complicated system: As fog is an extra layer in the data processing and storage system, it makes the whole system complicated. = Constrained scalability: Fog is not as scalable as the cloud. Module Module 10 Page 1330 Certified Cybersecurity Technician Certified Cybersecurity Technician Copyright ©© by EG-Counecil EG-Gomneil All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser