ISSN ONLINE(2320-9801) PRINT (2320-9798)

Yakışıklı erkek tatil için bir beldeye gidiyor burada kendisine türk Porno güzel bir seksi kadın ayarlıyor Onunla beraber otel odasına gidiyorlar Otel odasına rokettube giren kadın ilk önce erkekle sohbet ederek işi yavaş halletmeye çalışıyor sex hikayeleri Kocası fabrikatör olan sarışın Rus hatun şehirden biraz uzak olan bir türk porno kasabaya son derece lüks bir villa yaptırıp yerleşiyor Kocasını işe gönderip mobil porno istediği erkeği eve atan Rus hatun son olarak fotoğraf çekimi yapmak üzere türk porno evine gelen genç adamı bahçede azdırıyor Güzel hatun zengin bir iş adamının porno indir dostu olmayı kabul ediyor Adamın kendisine aldığı yazlık evde sikiş kalmaya başlayan hatun bir süre sonra kendi erkek arkadaşlarını bir bir çağırarak onlarla porno izle yapıyor Son olarak çağırdığı arkadaşını kapıda üzerinde beyaz gömleğin açık sikiş düğmelerinden fışkıran dik memeleri ile karşılayıp içeri girer girmez sikiş dudaklarına yapışarak sevişiyor Evin her köşesine yayılan inleme seslerinin eşliğinde yorgun düşerek orgazm oluyor

Camerareadycopy-ICGICT-403-Cloud Computing (Networks)

S. Kalaichelvi1
  1. Department of CSE, Master of Engineering, K.S. Rangasamy College of Technology, (Autonomous Institution) KSR Kalvi Nagar, Tiruchengode, Namakkal-637 215, Tamilnadu, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering


Cloud Computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients that include desktops, entertainment centers, tablet computers , notebooks , wall computers , handhelds , sensors, monitors etc. Cloud computing incorporates software as a service (SaaS) , Web 2.0 and other recent, well-known technology trends, in which the common theme is reliance on the Internet for satisfying the computing needs of the users. In cloud computing, we don't need to have our own resources, but can build applications on others resources too, down-sizing or scaling up according to your needs. Bit-torrent and Skype are successful cloud computing initiatives, but a lot of action is still waiting to happen in this field. In the next few years, cloud computing is going to be very critical, and software as a service will become the more prevalent model. It can be used for scientific applications where there is no outlay for high-end resources, and is even beneficial for colleges in India, which cannot afford expensive hardware. Some major service providers include Amazon, Google, Yahoo, Sales force. The cloud computing architecture can be viewed in two ways front end and back end. The front end which includes a simple PC with internet connection where the user can access his section of data. The back end includes the server and the data center of the cloud service provider


Cloud computing includes both a platform and a type of application. A cloud computing platform dynamicallyprovisions, configures, reconfigures, and deprovisions servers as needed. Cloud applications are those that are extended tobe accessible through the Internet. These cloud applications use large data centers and powerful, costs servers that host Webapplications and Web services. Cloud computing is an emerging approach to shared infrastructure in which large pools ofsystems are linked together to provide IT services. Cloud Computing will allow corporate data centers to operate more likethe Internet by enabling computing across a distributed, globally accessible fabric of resources, rather than on localmachines or remote server systems. Organizations can use them as much as they want and as wireless broadbandconnection options grow, wherever they need them. The key feature of cloud computing is that both the software and theinformation held in it live on centrally located servers rather than on an end-user's computer. "This means people can accessthe information that they need from any device with an Internet connection—including mobile and handheld phones—rather than being chained to the desktop. It also means lower costs, since there is no need to install software or hardware."


A cloud is a pool of virtualized computer resources. A cloud can:
Host a variety of different workloads, including batch-style back -end jobs and interactive, user-facing applications
Allow workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines orphysical machines
Support redundant, self-recovering, highly scalable programming models that allow workloads to recover frommany unavoidable hardware/software failures
Monitor resource use in real time to enable rebalancing of allocations when needed



Software as a Service is a model of software deployment where an application is hosted as a service provided tocustomers across the Internet, it delivers a single application through the browser to thousands of customers using amultitenant architecture .On the customer side, it means no upfront investment in servers or software licensing; on theprovider side, with just one app to maintainare low compared to conventional hosting. . By eliminating the need to installand run the application on the customer's own computer, SaaS eliminates the customer's burden of software maintenance,ongoing operation, and support. Conversely, customers relinquish control over software versions or changing requirements;moreover, costs to use the service become a continuous expense, rather than a single expense at time of purchase. UsingSaaS also can conceivably reduce that up-front expense of software purchases, through less costly, on-demand pricing.SaaS lets software vendors control and limit use, prohibits copies and distribution, and control all derivative versions oftheir software. This centralized control often allows the vendor to establish an ongoing revenue stream.
The SaaS software vendor may host the application on its own web server, or this function may be handled by athird-party Application Service Provider (ASP). This way, end users may reduce their investment on server hardware is by far the best-known example among enterprise applications, but SaaS is also common for HR apps andhas even worked its way up the food chain to ERP, with players such as Workday. Some of the online tool based on SaaSis Google Apps and Zoho Office. SaaS is expected to grow by more than 30 per cent a year and become a $10billion marketin another year. India is emerging as the fastest growing SaaS market in the Asia Pacific region with close to half of SaaSrevenue coming from the areas of Web conferencing and collaboration. Zoho is one company that has lost no time inestablishing its leadership position in the online hosted applications space. Zoho's popular suite of applications has beendescribed by the UK-based weekly newspaper The Economist as "the most comprehensive suite of Web-based programsfor small businesses." SaaS applications are generally priced on a per-user basis, sometimes with a relatively smallminimum number of users and often with additional fees for extra bandwidth and storage.
WEB 2.0:
2.0:The term "Web 2.0" describes the changing trends in the use of World Wide Web technology and web design thataim to enhance creativity, communications, secure information sharing, collaboration and functionality of the web. Web 2.0concepts have led to the development and evolution of web-culture communities and hosted services, such as socialnetworkingsites, video sharing sites, wikis, blogs, and folksonomies


The term utility computing is acquiring fashion even while cloud is still quite nebulous, the results for utilitycomputing as an effective IT strategy were notably more negative. Only 16.9% of respondents said they had adopted autility computing service, with another 9.5% saying they would do so this year. That left 73.6% with no plans. And take-upeven showed a slight fall from the previous year’s results. Only 48% of the sample rated the strategy as effective, with alarger percentage rating it as neutral. That effectiveness score was down from 61.5% a year earlier. Certainly, for as long asIT has appeared as an expense line on corporate accounts, businesses have wished there was a better way of sourcing ITservices. They have looked at ways to avoid large, upfront capital expenditure, and complex and time-consumingdeployment projects that yielded uncertain results. Above all, corporate executives have searched in vain for an IT deliverymodel that is dynamic and flexible enough to be easily aligned with their constantly changing business needs. In fact, ideally, business would like IT to be available as a pay-as-you-go, on-demand service akin to that provided by theelectricity generators and other utility suppliers. This, its proponents claim, is exactly what cloud computing can provide.
“The SaaS platform, with its comparatively short deployment cycle and high-refresh cycle is simply moredisposed to a higher level of innovation, and it is more open.”


IBM AND GOOGLE: The two I.T giants IBM and Google are investing in 'cloud computing' to build large datacenters which students in the United States universities can tap into over the internet to program and researchremotely. Altogether six universities including Carnegie Mellon, Massachusetts Institute of Technology, StanfordUniversity, the University of California, Berkeley, the University of Maryland and the University of Washingtonwill be involved in this venture of Google and IBM. Scientists say setting up and running data centers, andproviding the electricity and technical assistance is difficult and expensive. The two companies have committed atotal of 30 million dollars over two years for the project. In the corporate market, IBM along with others has builtinternet services to anticipate and forecast market trends, tailor pricing and optimize procurement andmanufacturing. These services use data centers that utilize thousands of processors, store countless libraries of dataand engage specialized software to tackle ''internet-scale computing challenges''.
TCS AND YAHOO: CRL, a wholly-owned subsidiary of Tata Sons Limited, along with Yahoo! supports cloudcomputing research. EKA, which is one of the fastest supercomputers in the world, would be made available byCRL to the researchers. This partnership brings together Yahoo!'s leadership role in the development of Hadoopand CRL's expertise in high performance computing, and will help bridge the gap between traditionalsupercomputing and cloud computing research in India. EKA is ranked the fourth fastest supercomputer in theworld, with 14,400 processors, 28 terabytes of memory, 140 terabytes of disks and a peak performance of 180trillion calculations per second (180 teraflops).
CLOUD GIANT AMAZON: Amazon was an early entrant in the market for the latter example of CloudComputing, and that is a service utility that allows the user to ’switch’ on both processing capacity, and storage asrequired, like any other utility. This is also paid for as a subscription, and new metrics like Giga-Hertz Hours areused for the pricing models. It is at this level that some of the large vendors see the potential for the future of thesoftware (and to a certain extent, hardware) industries. Amazon’s Elastic Compute Cloud (EC2) allows theimaging of servers and the use of web-services to provision these images on specified virtual platforms. Itcurrently allows a range of basic, to intermediate, to high-performance spaced platforms and these are priced on anhourly basis. Using the Amazon Simple Storage Service (S3) a complete application environment can beprovisioned from the stored images in a short period of time, used for a defined purpose and period, and thendecommissioned. In the corporate world, cloud computing has made it possible for small companies to compete onan even footing with competitors many times their size. They can preserve capital by renting IT services instead ofinvesting in hardware and applications or hiring programmers to design custom applications.
It might seem odd that Amazon, perhaps the world’s largest e-commerce merchant with $17 billion in annual revenue,would take out a major position in the cloud computing market, but it’s actually a very shrewd move. The company hasbuilt up a huge information technology infrastructure over the years, with massive amounts of computing power and digitalstorage. But by some estimates, the company utilizes just 10 percent of its total capacity much of the time. The reason itneeds so much headroom is to handle infrequent periods of peak demand; the rest of the time, the hardware largely sits idle.Amazon jumped into cloud computing with its Amazon EC2 (Elastic Compute Cloud) service in an effort to increase itsreturn on its IT investments by taking advantage of the excess idle time on its servers. Amazon EC2 is based on virtualmachine technology, software-based computers that share their host’s hardware resources. An Amazon EC2 customercreates and uploads to Amazon’s servers something Amazon calls an Amazon Machine Image. This image consists of theoperating system and application software the customer needs to run, plus the data associated with it. The customer thenorders up whatever number of virtual machines they need for their computing environment.


Cloud architecture extends to the client, where web browsers and/or software applications access cloudapplications. The majority of cloud computing infrastructure as of 2009 consists of reliable services delivered through datacenters and built on servers with different levels of virtualization technologies. The services are accessible anywhere in theworld, with The Cloud appearing as a single point of access for all the computing needs of consumers. Commercialofferings need to meet the quality of service requirements of customers and typically offer service level agreements. Openstandards and open source software are also critical to the growth of cloud computing. Cloud storage architecture is looselycoupled, where metadata operations are centralized enabling the data nodes to scale into the hundreds, each independentlydelivering data to applications or users. The cloud computing system architecture can be divided into 2 sections, the frontend and the back end. They connect to each other through a network, usually the Internet.
The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system. Thefront end includes the client's computer (or computer network) and the application required to access the cloud computingsystem. Not all cloud computing systems have the same user interface. Services like Web-based e-mail programs leverageexisting Web browsers like Internet Explorer or Fire fox. Other systems have unique applications that provide networkaccess to clients.
On the back end of the system are the various computers, servers and data storage systems that create the "cloud"of computing services. In theory, a cloud computing system could include practically any computer program you canimagine, from data processing to video games. Usually, each application will have its own dedicated server. A centralserver administers the system, monitoring traffic and client demands to ensure everything runs smoothly. It follows a set ofrules called protocols and uses a special kind of software called middleware. Middleware allows networked computers tocommunicate with each other. If a cloud computing company has a lot of clients, there's likely to be a high demand for alot of storage space. Some companies require hundreds of digital storage devices. Cloud computing systems need at leasttwice the number of storage devices it requires to keep all its clients' information stored. That's because these devices, likeall computers, occasionally break down. A cloud computing system must make a copy of all its clients' information andstore it on other devices. The copies enable the central server to access backup machines to retrieve data that otherwisewould be unreachable. Making copies of data as a backup is called redundancy.


BROWSER VULNERABILITIES: Cloud services are often used and managed with web browsers. Browsersare a major target for hackers; they are the weak point in any security strategy.
VULNERABLE APIs: The employees of an organization have to access and manage the cloud remotely viaAPIs. These APIs enlarge the attack surface of an organization, since the unnecessary data are the firewall. If anAPI of a cloud provider has vulnerability, it might expose an organization's data to anyone who gets access to thecorresponding exploit.
MONOCULTURE: Large datacenters are like large cornfields. Monocultures are more vulnerable to pests thanare smaller units.
INTERESTING YARGET FOR HACKERS: Cloud providers are an interesting target for hackers. Once theyare in the datacenter, they have access to not only one but hundreds or even thousands of organizations. The morehackers who attack a datacenter, the more likely it is that they will get in, sooner or later.
TERRORIST ATTACK: Large datacenters are also interesting targets for terrorists. Destroying a big data centerthat hosts the IT infrastructure of many important companies is probably more "effective" than crushing askyscraper.


The applications of cloud computing are practically limitless. With the right middleware, a cloud computingsystem could execute all the programs a normal computer could run. Potentially, everything from generic word processingsoftware to customized computer programs designed for a specific company could work on a cloud computing system.Here are just a few reasons to rely on another computer system to run programs and store data:
Clients would be able to access their applications and data from anywhere at any time. They could access thecloud computing system using any computer linked to the Internet. Data wouldn't be confined to a hard drive onone user's computer or even a corporation's internal network.
It could bring hardware costs down. Cloud computing systems would reduce the need for advanced hardware onthe client side. You wouldn't need to buy the fastest computer with the most memory, because the cloud systemwould take care of those needs for you. Instead, you could buy an inexpensive computer terminal. The terminalcould include a monitor, input devices like a keyboard and mouse and just enough processing power to run themiddleware necessary to connect to the cloud system.
Corporations that rely on computers have to make sure they have the right software in place to achieve goals.Cloud computing systems give these organizations company-wide access to computer applications. The companiesdon't have to buy a set of software or software licenses for every employee. Instead, the company could pay ametered fee to a cloud computing company.
Servers and digital storage devices take up space. Some companies rent physical space to store servers anddatabases because they don't have it available on site. Cloud computing gives these companies the option ofstoring data on someone else's hardware, removing the need for physical space on the front end.
Corporations might save money on IT support. Streamlined hardware would, in theory, have fewer problems thana network of heterogeneous machines and operating systems.
If the cloud computing system's back end is a grid computing system, then the client could take advantage of theentire network's processing power. On a grid computing system, the client could send the calculation to the cloudfor processing. Computers on the back end, significantly speeding up the calculation.


Cloud computing is the next big wave in computing. It has many benefits, such as better hardware management,since all the computers are the same and run the same hardware. It also provides for better and easier management of datasecurity, since all the data is located on a central server, so administrators can control who has and doesn't have access tothe files. There are some down sides as well to cloud computing. Peripherals such as printers or scanners might have issuesdealing with the fact that there is no hard drive attached to the physical, local machine. If there are machines a user uses atwork that aren't their own for any reason, that require access to particular drivers or programs, it is still a struggle to get thisapplication to know that it should be available to the user. A strong security is concerned with cloud computing as there ischance for hacking the entire data centre results in loss of entire data and miss use of information.