🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 10 - 02 - Understand Cloud Computing Fundamentals - 05_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 Cloud Storage Architecture B B Cloud storage is a data storage medium used to CN RO N store digital data in logical pools using a network e ‘ a Architect: ;] ;l — Front-End The Front-end layer is accessed by the end us...

Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 Cloud Storage Architecture B B Cloud storage is a data storage medium used to CN RO N store digital data in logical pools using a network e ‘ a Architect: ;] ;l — Front-End The Front-end layer is accessed by the end user 2 where Pit provides APIs for the management of data storage The Middleware layer performs several functions such as data de-duplication and replication of data.. The Back-end layer is where the hardware is implemented ) g N e Virtual Computer Servers J\ ‘Public APIs for Data and Management The cloud storage architecture consists of three main layers namely, front-end, middleware, and back-end @ High Level Cloud St Fie M ol Object Storage = Middleware (— Back-End Object Storage l l Physical St Logical Storage Pools ' Se! ST ve— Cloud Service Location 1 Physical Storage Servers Location n Cloud Storage Architecture Cloud storage is a medium used to store digital data in logical pools using a network. physical storage is distributed to multiple servers, which are owned The by a hosting company. Organizations can buy storage capacity from the cloud storage providers for storing user, organization, or application data. Cloud storage providers are solely responsible for managing the data and keeping the data available and accessible. Cloud storage services can be accessed using a cloud computing service, a web service API, or any applications that use the API, such as cloud desktop storage, cloud storage gateway, or web-based content management The cloud storage service is operated from an off-premises service, like Amazon S3. systems. The cloud storage architecture possesses the same characteristics as cloud computing in terms of scalability, accessible interfaces, and metered resources. It is built on highly virtualized infrastructure and relies on multiple layers to provide continuous storage services to users. The three main layers correspond to the front-end, middleware, and back-end. The front-end layer is accessed by the end-user and provides APIs for the management of data storage. The middleware layer performs functions such as data de-duplication and replication of data. The back-end layer is where the hardware is implemented. Cloud storage is made of distributed resources. It is highly fault-tolerant through redundancy, consistent with data replication, and highly durable. Widely used object storage services include Amazon S3, Oracle Cloud Storage and Microsoft Azure Storage, Open Stack Swift, etc. Module 10 Page 1326 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 High Level Cloud Storage Architecture 5l Y — Front-End Virtual Computer Servers Virtual Computer J \ Public APIs for Data and Management Servers — Block, File or fa L Logical Storage Pools T J | Ea Object Storage Middleware Physical Storage Servers Physical Storage Cloud Service Location 1 Location n — Back-End Servers Figure 10.28: Cloud storage architecture Module 10 Page 1327 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 Fog Computing L3 O Fog computing is a distributed and independent digital environment in which applications and data storage are QO It acts as an intermediary between the hardware and remote servers and is also called as an intelligent gateway O 1tis used for enhanced data processing, storage, and analysis in a quick and efficient manner positioned between data sources (devices generating data) and a cloud service Internet/cloud rog Compnting fi.................... Axchitecture H Gateway ! ff_ r loT devices Copyright © by EC- til All Rights Reserved. ReproductionIs Strictly Prohibited. Fog Computing The massive growth in loT devices worldwide has resulted in the production of an amount of data by these devices. To meet the growing demand for analyzing and these data, the implementation of fog computing, along with cloud computing, solution. Fog computing is a distributed and independent digital environment in enormous processing is an ideal which the applications and data storage are positioned between data sources (devices generating data) and the cloud service. Fog computing is an extended version of cloud computing that comprises multiple edge nodes that are directly connected to physical devices to enable service access to the end users. Generally, fog refers to the idea of creating an individual layer in distributed network infrastructure that has close inter-connections with 10T and cloud computing. It acts as an intermediary between the hardware and remote servers, and it is also called an intelligent gateway. Fog can be used for enhanced data processing, storage, and analysis in a quick and efficient manner. Many organizations have adopted this technology as it can provide additional functionalities for quick and efficient data processing, storage, and analysis. Working of Fog Computing Devices with an Internet connection, computational abilities, and data storage are referred to as nodes of fog. Fog nodes can be deployed anywhere in a network. The loT applications for fog nodes are ported at the network edge. The fog nodes close to the network edge take data from loT devices, enabling short-term analytics at the edge. Fog computing can be very beneficial in case of an unstable Internet connection. Urgent requests are transmitted directly into the fog and are processed in real time in the local network. Fog computing can be used in applications such as smart cities, smart grids, connected cars, and real-time analytics. Module 10 Page 1328 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 Internet/cloud I; IoT Gateway ; | N—— devices 7;_‘ — AR Figure 10.29: Fog computing architecture Advantages: Fog computing has been beneficial in the field of 10T, big data, and real-time analytics. The following are the main advantages of fog computing over cloud computing. Low latency: Fog computing can process large volumes of data with no delay as the fog is geographically nearer to end users and can offer rapid responses. High business agility: Developers can easily and swiftly design fog instances and deploy them based on the requirement. No glitches with bandwidth: All the data are accumulated at distinct points, instead of being transmitted together to one center through a single channel, thereby avoiding bandwidth-related problems. No connection loss: The presence of several interconnected channels does not cause connection loss. Elevated security: Fog computing enhances security as the data processing is performed by numerous nodes in a complex distributed system. Low operating cost: Fog computing can drastically reduce cost through the conservation of network bandwidth as data are processed locally, instead of being sent to the cloud for analysis. High power efficiency: Wave, or Bluetooth. Edge devices run power-saving protocols such as Zighee, Z- Disadvantages: The following computing. are Additional some of the expenditures: disadvantages Organizations of fog must computing buy additional in comparison edge devices to cloud such as routers, hubs, and gateways. Module 10 Page 1329 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 = Complicated system: As fog is an extra layer in the data processing and storage system, it makes the whole system complicated. = Constrained scalability: Fog is not as scalable as the cloud. Module 10 Page 1330 Certified Cybersecurity Technician Copyright © by EG-Counecil All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser