🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 10 - 02 - Understand Cloud Computing Fundamentals - 06_ocred_fax_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Edge Computing Edge...

Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Edge Computing Edge Computing Architecture 0 Edge computing is in which data processing is Cloud Data center performed close to edge devices O It helpsin that perform fast processing and enables efficient real-time applications ---" BEEITLLE Internet of Things Edge Computing Conventional cloud computing has some issues related to data security, low performance, and increased data storage, which lead to high operational costs. These issues can be solved by replacing conventional cloud computing with edge computing. Edge computing is a subset of fog computing, and its approach to data processing is similar to that of fog computing. In fog computing, the intelligent gateway performs processing at the LAN, whereas in edge computing, the edge gateway intelligence is performed in devices such as programmable automation controllers. Edge computing is used in solutions that require the processing of small and urgent operations within a timespan of milliseconds. Edge computing is a distributed, decentralized computing model in which computation and data processing are performed close to edge devices. It stores data at locations close to the devices from which the data were collected, instead of trusting a central location to store the data. It also reduces the Internet bandwidth usage and data offload. Many organizations can utilize this technology for building automation systems for fast processing, prompt responses, and efficient real-time applications. Module 10 Page 1331 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Cloud Data center gessssssnnsassnnnnnannnnnnsnannnannannnsnnnnlosnnannann 'l-llllll-lll:lllllllllll'l.-ll'llllllilll.l-l IIIIIIII.I-. @rrnnannnnn)p DQ..........; EDGE Real-time data Real-time data Data caching and Datacachmg and Machine Machine toto processing optimization mac_hine macpine b Illllllllll.ll.;.IllIllll‘lllllllllllllIll.illllllllllllll.llIllll,ll.lllll..l.lllllllll. v !. ‘l.lIIIIl.lll..lfliliflllfllIltlllllIIIIII.IIIIIEIIIIIIDIII.IIIIIIIIIIIIl,IIIII.;llllllllllllll: Internet of Things Figure 10.30: Edge computing architecture Module 10 Page 1332 Certified Cybersecurity Technician Copyright © by EC-Council EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Cloud vs. Fog Computing vs. Edge Computing Thousands of cloud CLOUD Internet/cloud ot casliars COMPUTING FOG S Millions of fog COMPUTING Sz nodes -, @ :@ e. #.................. ) ((A) COMPUTING Real-time data Data caching and Machine to o processing optimization madtlnc {it H : Billions of edge devices.............--.--...-..:...-.--.....--........-un-.......................................................... 1 fiofifl.!gff Copyright © by EC il All Rights Reserved. Reproductionis Strictly Proh Cloud vs. Fog Computing vs. Edge Computing Edge computing and fog computing are extensions of cloud computing. Cloud computing is a centralized model that contains several (thousands of) servers processing data in real time. Edge computing contains an infinite number (billions) of virtual/hardware endpoints that work as a distributed, decentralized model, where data processing is performed near edge devices (loT devices). Fog computing infrastructure contains countless (millions of) nodes, where data storage, data processing, and analysis are performed quickly and efficiently. It is a decentralized intelligent gateway positioned anywhere between a data source and cloud infrastructure. Feature Cloud computing Fog computing Edge computing Higher han ". 'ehe acce§s speed tha Higher speed than cloud | Higher speed than fog Speed fog computing but depends cambistin cOmBitin on VM connectivity puting puting Latency High latency Low latency Low latency Data Integrates multiple data Integrates multiple data | Integrates limited data Integration sources sources and devices sources No data reduction while Reduces the amount of | Reduces the amount of Capacity delivering or converting data sent to cloud data sent to fog data computing computing Responsiveness | Low response time High response time High response time. Less secure than fog... Security. Highly secure Customized security computing Table 10.4: Comparison among cloud, fog, and edge computing Module 10 Page 1333 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing g— CLOUD. Internet/cloud '(I;housands of cloud Thousands Internet/cloud COMPUTING L / data centers ata centers [ gr— | FOG Millions of fog Servers L COMPUTING | Servers nodes e...o s nnn,,... -......'.‘ :::..-0 aeetsde,..'...‘. o°.-..-'-t:"...:.o.‘ eovniis E., 1 P (TY) po—.\‘:::.-""'.‘....'o...“.......:" - e (1)) el bt P o COMPUTING | = jem—] Real-time data Data caching and Machine to processing optimization machine ~—— - sssssnlonnnnsn Billions of edge devices Sessscesscascancsscennpescetstagesesscattssntiee sesssssssssssssasssnssnsassassahinasaasarraasansannnnng e - 1 ® = B & B T7T 7T Figure 10.31: lllustration Illustration of cloud, fog, and edge computing Module 10 Page 1334 Certified Cybersecurity Technician Copyright © by EC-Gouncil EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing Cloud Service Providers Find Accurate Information » Faster What will you create this year? Capture the true s | ACcelerate your Eeeermeeme] Value of cloud transformation. = an(l-m for your with Google : ousiness Cloud |====a] [P ot i e g Sumbam -. et e s No Nerd Cloud e —— i e 3 SF Podcast Memps //ctoud google com Aezps //werw bem com Copyright © by L AR ghts Reserved. Reproduction is Strictly Prohibited. Cloud Service Providers Discussed below are some of the popular cloud service providers: = Amazon Web Service (AWS) Source: https://aws.amazon.com AWS provides on-demand cloud computing services to individuals, organizations, the government, etc. on a pay-per-use basis. This service provides the necessary technical infrastructure through distributed computing and tools. The virtual environment provided by AWS includes CPU, GPU, RAM, HDD storage, operating systems, applications, and networking software such as web servers, databases, and CRM. Contact Sales Supporte Englshe ™ Partner Network AWS Marketplace Customer Enablement Find Accurate Information < Faster Improve customer interactions and boost workforce productivity with intelligent search Ammn-;mu it Containers %Q Ituqm Document rwuwnq &\\QT Build an Aoa Bachend in Mautes oy Build Apps Farter weth GraghQL Figure 10.32: Screenshot of Amazon AWS Module 10 Page 1335 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing = Microsoft Azure Source: https://azure.microsoft.com Microsoft Azure provides cloud computing services for building, testing, deploying, and managing applications and services through Azure data centers. It provides all types of cloud computing services, such as Saa$, PaaS, and laaS. It offers various cloud services, such as computing, mobile storage, data management, messaging, media, machine learning, and loT. Microsoft Azure Microsoft Azure act S - cout Portsl Lalthe Marketplace Partners vv Suppor Partners What will you create this year? Build personalised, future-ready e experiences today that don't need to experiences be rebuilt as your needs evol Signn up for an Azure free account and get freeAl services—and a 114,500 4,500 credit Figure 10.33: Screenshot of Microsoft Azure = Google Cloud Platform (GCP) Source: https://cloud.google.com laas, PaaS, and serverless computing services. These include computing, GCP provides laaS, data storage and analytics, machine learning, networking, bigdata, cloud Al, management tools, identity and security, 10T, and API platforms. & Google Cloud Why Google Soiut Products Pri tting Started Q ( Suppont Engish - ContoctUs e Accelerate your transformation with Google Cloud Build apps faster, make smarter business decisions, and connect people and connect people anywhere. anywhere. Run on the cleanest cloud in the industry. ° Got Get started startod for for free free Develop new Develop new apps apps and and Enable zmarter smarter decizion decition making Transform how you connect Tranzform how Build and and invest in your your cloud with fatter experiences faster across your organization and collaborate confidence Figure 10.34: Screenshot of Google Cloud Platform Module 10 Page 1336 Certified Cybersecurity Technician Copyright ©© by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Virtualization and Cloud Computing = IBM Cloud |BM Source: https://www.ibm.com IBM Cloud™ is a robust suite of advanced data and Al tools and deep industry expertise. 1aaS, SaaS, It provides various cloud services, such as laaS, Saa$S, and Paas, Paa$, through public, private, and hybrid cloud delivery models. These services include computing, networking, storage, management, security, databases, analytics, Al, 10T, loT, mobile, Dev tools, and blockchain. IBM IBM clow Cloud Products Solutions Pricing v~ Docs Support v Explore more more ~ Q Contact us Loginin Log Start for free Capture the true value of cloud and Al for your business 1BM Cloud, with Red Hat, brings 18M together market-leading security, enterprise scalability and open innovation for increased agility and continuity Sign up or log in > Explore our products = No Nerd Cloud Demystifying Cloud Tech For You Podcast Listen Now Listen Now I(I Let’s Lat’s talk \,I| Figure 10.35: Screenshot of IBM Cloud Module 10 Page 1337 Certified Cybersecurity Technician Copyright © by EC-Council EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser