Topics:: Isca By: Saurabh Vig (Mca) +91-9897095049
Topics:: Isca By: Saurabh Vig (Mca) +91-9897095049
Topics:: Isca By: Saurabh Vig (Mca) +91-9897095049
Topics:
1. Grid Computing.
2. Types of Clouds.
3. Cloud Computing Service Models.
4. Components of Mobile Computing.
5. How Mobile Computing Works.
6. Limitations of Mobile Computing.
7. Issues in Mobile Computing.
8. Green Computing Best Practices.
9. Advantages of BYOD.
10. Web 3.0.
-1-
ISCA BY: SAURABH VIG (MCA) +91-9897095049
EMERGING TECHNOLOGIES
Grid Computing:
• Grid Computing is a collection of computers (CPU & other resources), often
geographically dispersed, that are coordinated in such a manner that all machines
function as one large computer to solve a complicated task, a common goal.
• To make grid computing work, large computing tasks are broken into small
chunks, which can then be completed by individual computers. After processing has been
completed, the results from the application are reassembled from the participating servers.
• Grid computing is managed with a kind of software such as middleware, in
order to access and use the resources remotely.
-2-
ISCA BY: SAURABH VIG (MCA) +91-9897095049
Difference between GRID Computing and CLOUD
Computing:
AREA Differences
Data Storage Grid Computing is well suited for data-
intensive storage, it is not economically
suited for storing smaller objects.
Computation Task Grid computing are often used for
processor intensive task. It divides piece
of programs among several computers,
if one piece of software on a node fails,
other piece of the software on other
nodes may fail.
Example: storing and accessing data and programs over the Internet instead of
your computer's hard drive. Cloud computing provides services to customers using
principle of: “Use what they need on internet and pay only for what they use”.
In cloud Computing:
• The consumer no longer has to be at a PC i.e. user can use any device for using
applications.
• The consumers do not own the infrastructure, software, or platform in the
cloud, this leads to lower upfront costs.
• The consumer does not care how servers and networks are maintained in the
cloud.
-3-
ISCA BY: SAURABH VIG (MCA) +91-9897095049
Pertinent issues in cloud computing:
These are the issues which cloud service providers need to take care while designing cloud
services:
• Threshold Policy: Let us suppose we had a program that did credit card
validation in cloud. Use of credit card will rise sharply during the festival seasons
and will decrease significantly after the festival season is over. The program
processing the credit card should have the capability to provide more processing capabilities
during buying seasons and de-allocate these processing for other work when buying season
is over i.e. working out threshold is really a matter of concern.
• Hidden Costs: Cloud computing service providers do not reveals hidden cost such as
higher charges for data storage and use of applications during peak time and companies
could experience slow services particularly during heavy traffic.
Front End: The front end of the cloud computing system comprises the client’s
device such as laptop, ipad, smart phone, pc etc. These devices need some application
-4-
ISCA BY: SAURABH VIG (MCA) +91-9897095049
for accessing the clod computing system. All the cloud computing systems do not give same
interface to users. Web services like Email can use existing web browsers such as fire fox,
IE as interface. Other types of systems have some unique application and interface which
provides the network access to its clients.
Back End: Back End primarily consists of servers which provide services. In cloud
computing back end is cloud itself and consists of various computer machines, data storage
systems and servers. In general any cloud computing system can include practically any
type of computer machine program that can be imagined by a human being such as video
games, data processing software, data sharing programs etc generally, in cloud computing,
every application will have its individual dedicated server for services.
-5-
ISCA BY: SAURABH VIG (MCA) +91-9897095049
2. Affordable: In public cloud, customers are never required to manage,
upgrade hardware or software. Customers pay only for the resources they use.
3. Less Secure: Public cloud is less secure because it is offered by third party
and they have full control over cloud.
4. Stringent SLAs: All public cloud service vendor work with service level
agreement that describes the availability of their services and any penalties
that might accrued in case the SLA is not met.
Limitations:
Security and Uptime might not meet enterprise compliance standards.
-6-
ISCA BY: SAURABH VIG (MCA) +91-9897095049
Advantages of Private Cloud:
Limitations: More expensive to deploy and maintain since hardware is dedicated to single
organization.
-7-
ISCA BY: SAURABH VIG (MCA) +91-9897095049
1. Scalable: The hybrid cloud with the help of its public counterpart is also
scalable.
2. Partially Secure: The private cloud is considered as secure and public
cloud has high risk of security breach. The hybrid cloud is thus partially
secure.
3. Complex Cloud Management: Cloud management is complex as it
involves more than one type of deployment models and also the numbers
of users is high.
Advantages:
1. It provides better security than public cloud.
2. It is highly scalable and gives the power of both public and private cloud.
-8-
ISCA BY: SAURABH VIG (MCA) +91-9897095049
3. Cost Effective: Community cloud is cost effective since it is shared by several
organizations or community.
1. Web Access: SaaS services allow the end users to access the application
from any location with any devices that is connected to internet.
2. High availability: SaaS services ensures 99.99% availability of user data
as proper backup and recovery mechanism are implemented.
3. On to Many: SaaS services are delivered as one to many models where a
single instance of the application can be shared by many customers.
4. Centralized Management: Since SaaS services are hosted and managed
from the central location, the SaaS providers provides the automatic
updates to ensure that each customer is accessing the most recent version
of application.
5. Multi-device support: SaaS services can ne accessed from any end user
devices such as desktop, laptop, smartphone, tablet and thin client.
-9-
ISCA BY: SAURABH VIG (MCA) +91-9897095049
2. API as Services (APIaaS): This allows users to explore functionality of Web
services such as Google Maps, Payroll Processing etc.
3. Email as a Service (EaaS): This provides users with an integrated system of
emailing, office automation, and record management.
1. All in One: Most of the PaaS providers offer services like Programming
language to develop, test, deploy and maintain applications in the same
integrated Development Environment (IDE).
2. Built-in Scalability: PaaS services provider built in scalability. This ensures
that the application is capable of handling varying loads efficiently.
3. Diverse Tools: PaaS providers offer a wide variety of tools like When User
Interface, Application Programming Interface.
4. Offline Access: The developer can develop an application locally and deploy it
online whenever they are connected to the internet.
5. Web access to the development platform: PaaS provides web access to
the development platform that helps the developers to create, modify, test and
deploy different applications on the same platform.
- 10 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
2. Storage (Storage as a Service or STaaS): It provides various forms of
data storage.
3. Network (Network as a Service or NaaS): It provides vitual networking
components such as virtual bridge, router.
4. Load Balancers (Load balancing as a Service or LBaaS): It may
provide load balancing capability. For example if there are four identical
servers A, B, C, D and whose relative load are 80%, 60%, 40% and 20%
respectively. After load balancing, all servers would end with the same
load-50% of each server’s capacity.
- 11 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
sends its image to users real desktop. Instead of a local desktop, the user can
access their own desktop on cloud from different places, without buying and
managing own infrastructure.
2. Data as a Service (DaaS): In this model, cloud service provider hosts a large
centralized repository of data. DaaS consumers pay a fee to search for and access all
of this data in the cloud. However, as the data is owned by the providers, users can
only perform read operations on the data. DaaS is highly used in financial data
services.
4. Identity as a Service (IDaaS): In this cloud model, the end users; typically an
organization; to access the authentication infrastructure that is built, hosted,
managed and provided by the third party service provider.
• High Scalability: Can meet any level of business requirements for storage and
processing etc immediately.
• Pay Per Use Mode: Provides services on pay per use basis without setting up costly
infrastructure and this helps to reduce cost for users.
• Multi Sharing: Allows sharing of resources to multiple users from anywhere and
thus reduces costs.
• Virtualization: It allows sharing multiple servers on the fly i.e. without permanent
storage and processing allocation which help in optimum use of resources.
- 12 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
Advantages of Cloud Computing: cloud computing provides large
number of benefits:
• Cost Efficiency: Cloud computing is highly cost efficient method to use. The
traditional desktop software costs companies a lot in terms of finance. Adding up license
fees for multiple users can prove to be very expensive. The cloud on the other hand is
available at much cheaper rates and it significantly lowers the companies IT expenses.
• Easy Access of Information: One can access the information and applications from
anywhere by using internet.
• Availability: Providing data availability on 24*7 basis is another big issue for cloud
service provider. They need to implement BCP, DRP and controls for denial of service attack
etc such that the data is available in any situation to its owner when required.
- 13 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
• Trust: Trust is an important issue in Cloud. Various clients’ oriented studies reveals
that cloud still failed to build trust between client and service provider.
• Governance: Every organization has their own governance rules and policies to
meet their business objectives. Extending theses governance rules, policies and business
objectives to cloud service provider system is also an issue or big challenge.
• Application Security: In cloud computing the application for data processing are
stored on cloud thus face the issue of application security.
• Data Stealing: Data stored in cloud is accessible from anywhere at any time. In
such cases data stealing can arise particularly when cloud service provider outsource the
data storage to other service provider servers. In such cases, there is a probability that the
data is less secure and is more prone to loss from external servers.
Mobile computing allows using data and data processing services from anywhere while on
move i.e. while moving from one location to another. There are many popular mobile
computing devices:
• PDA
• Smart phone
- 14 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
• Tablet Computer
• IPad.
• Iphone.
1. The user enters or access data using the application on handheld computing device.
2. Using one of several connecting technologies, the data are transmitted from
handheld to sites information system where files are updated.
3. Now both systems (handheld and site’s computer) have same information and are in
sync.
4. The process work the same way starting from other direction.
• It helps to provide mobile workforce with remote access information from anywhere,
such as order details, complaints details etc.
• It enables mobile workforce to update information in real time from anywhere,
facilitating excellent communication
- 15 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
• Insufficient Bandwidth: Mobile internet access is generally slower than direct cable
connections using technologies such as GPRS (General packet radio service), 3G, 4G
networks. These networks are usually available within a range of commercial cell
phone towers.
• Transmission Interference: Weather; and the range from nearest signal point can
all interfere with signal reception. Reception in tunnels, some buildings and rural
areas is often poor.
• Security Standards: With working mobile, one is dependent on public networks,
requiring careful use of VPN. Security is a major concern while concerning the mobile
computing standards.
•
Issues in Mobile Computing and Required Measures to Resolve
Them:
• Security issues: Wireless networks need more security than wired network. To
ensure security, following security measures including the use of encryption may be
considered:
1. Confidentiality: Preventing unauthorized users from accessing to
critical information.
2. Integrity: Ensures unauthorized medications cannot takes place.
3. Availability: Ensures authorized users getting the access they require.
4. Legitimate: Ensuring that only authorized users have access to
services.
• Bandwidth: Wireless networks provide lower bandwidth compared to wired
networks. For improving network capacity, techniques such as data compression,
splitting large applications into smaller ones are commonly used.
• Power Consumption: Mobile computers will rely n their batteries as the primary
power source. Batteries should be ideally as light as possible but the same time they
should be capable of longer operation times. Power management can also help to
resolve this issue. Individual Components, be powered down when they are idle.
• Technical Architecture: Complete connectivity among business mobile iser is
necessary. To achieve this, the current communication technology must be revised to
incorporate mobile connectivity.
• Reliability, coverage, capacity and cost: At present; wireless network is less
reliable, have less geographic coverage and reduce bandwidth, slower and cost more
than the wired line network services. It is important to find ways to use this new
resource more efficiently by designing innovative appliances.
• Location Intelligence: Mobile devices encounter varied network conditions as a
result of their mobility. This can increase the network latency as well as risk of
disconnection. In mobile computing, there is a need to switch interfaces while moving
from one region to another, which requires changing the access protocol for different
networks. Thus these lead to complexity of mobile communication compared to
tradition computing. Therefore service connections must be dynamically transferred
to the nearest server. However when load balancing is a priority this may not be
possible.
- 16 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
access information and application. The BYOD policy has rendered the workspace flexible,
empowering employees to be mobile and giving them right to work beyond their required
hours. The term is also used to describe the same practice applied to students using
personally owned devices in education institutes.
- 17 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
Advantages of BYOD:
1. Happy Employees: Employees love to use their own devices when at work.
This also reduces the number of devices an employee has to carry; otherwise he
would be carrying his personal as well as organization provided devices.
2. Increased Employee Efficiency: The efficiency of employees is more when
employee works on his/her own device. In an organization provided devices,
employees have to learn and there is learning curve involved in it.
3. Lower IT Budgets: The employees could involve financial saving to the
organization since employees would be using the devices they already
possess, thus reducing the outlay of the organization in providing devices to
them.
4. IT reduces support requirement: IT department does not have to provide
end user support and maintenance for all the devices resulting in cost
savings.
5. Early adoption of new Technologies: Employees are generally proactive in
adoption of new technologies that result in enhanced productivity that helps to
overall growth of business.
In general, most businesses waste resources in the form of energy, paper, and money.
These wastages can be avoided or reduced and the saving could be invested to develop new
products or services, or to hire and train employees.
There are many simple steps one can take to do this, no matter what the size of business is
Legal Validity of Electronic message and email is also helping in this direction and helping to
reduce paper wastage. Indian Railways accept SMS or Email as valid ticket and request
- 18 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
users not to take printout of tickets to avoid wastage. In addition, making computers with
more environment friendly materials and designing them to consume less energy,
developing virtualization are some initiative for Green IT.
• Recycle e-waste:
1. Dispose of e-waste according to central, state and local regulation.
2. Manufacturer must offer safe end of life management and recycling options
when product become unusable
3. Recycle computers through manufacture’s recycling services.
• Conserve Energy:
1. Power down the CPU and all peripherals during extended periods of
inactivity.
2. Use notebook computers rather than desktop computer whenever possible.
3. Power up and Power down energy intensive peripherals such as laser
printers according to need.
4. Use LCD monitors rather than CRT monitors.
5. Use the auto power management features to turn off hard disk and display
after several minutes of inactivity.
6. Minimize the use of paper.
7. Employ alternative energy source for computing servers, workstations and
data centers.
- 19 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
Green IT Security Services and Challenges:
There are two types of networks: Physical and Logical Network. Physical network is
network of computers and devices whereas logical network is network of
communities and human being to exchange ideas and information with each
other. Such logical networks are known as social media or social network.
Physical networks compromised of computers, communication channels,
communication devices etc whereas social network is comprised of human beings.
Social media refers to the means of interaction among people in which they
create, share and exchange information and ideas in virtual communities and
networks.
A social network is usually created by a group of individuals who have a set of common
interest and objectives. In the internet space large number of social networks is formed but
only a few have achieved their true objectives.
The large scale computerization and the powerful advent of E-Commerce and internet have
given new dimension and a structured form to these networks. Web 2.0 has been one of
the greatest contributors in this area and called Technology diminishing the human
distance.
- 20 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
Web 2.0: Web 2.0 is an advance form of web access. It is an extension of web
1.0 which was a read only platform to read/write platform. Web 2.0 allows online
community to meet, exchange information, collaborate and communicate using
web based tools and social networking sites.
These tools are now main components of the Web. Web 2.0 basically refers to the transition
from static HTML web pages to a more dynamic Web that is more organized and is based on
serving Web application to users. Blogs, facebook are the examples of Web 2.0.
- 21 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
- 22 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
Life Cycle of Social Network: Let us see how Web 2.0 is linked with entire
life of social network. Consider the diagram below for social life cycle:
Web 2.0 provides excellent communication mechanism concepts like blogging to keep
everyone in the network involved in the day to day activities.
- 23 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
Future Scope of Web 2.0 in Social Networks:
People are coming much closer to another and all the geographical boundaries are being
reduced at lightning speed which is one of the biggest sustenance factors for any social
network.
Challenges for Social Networks using 2.0:
Web 3.0: Web 3.0 is the next step in the evolution of the internet and web
applications. Sometimes this is referred to as a Semantic Web. Semantic means if
focuses on applications that automatically prepare personalized content for users
Example: Google now uses data from the web, searches for interrelationships among data,
and automatically present relevant information to the users filtered by contextual factors
such as time, location etc. One goal of web 3.0 is to tailor online searches and requests
specifically to user’s preferences and needs.
Components of Web3.0:
Semantic Web: It is an intelligent software program that understands content of
web pages. It allows computers to be able to understand the meaning of the content and
search engines will be able to give richer and more accurate answer.
- 24 -
ISCA BY: SAURABH VIG (MCA) +91-9897095049
CHECK YOUR PROGRESS:
- 25 -