space mouse ppt
-
Upload
akanksha-verma -
Category
Documents
-
view
17 -
download
2
Transcript of space mouse ppt
Presentation
Of
Industrial training
done at
ISRO
Presented By: Shilpa Suman
IT-B Enrol. No. :090464
CONTENTS
1. Introduction to ISRO. 2. Introduction to Cloud Computing3. Similar systems And Concept Of Cloud Computing 4. Characteristics of Cloud Computing 5. Service Models6. Deployment Models7. Architecture Of Cloud Computing8. Issues
INTRODUCTION ISRO is an independent Indian Governmental
Organization which is established in November 1969 .
”The Prime Objective of ISRO is to develop space technology and its application to various national tasks.
“Vikram Sarabhai is known as the father of Indian space programme.
Mr.Madhavan Nair is currently the Chairman of Indian Space Research Organization.
Its Head Quarter is in Bangalore. ISRO’s hardware and services available
commercially through Antrix Corporation.
Contd…The various DOS centers of India are:
Contd…
ISRO Telemetry, Tracking and Command Network (ISTRAC)
INSAT Master Control Facility (MCF)
ISRO Inertial Systems Unit (IISU)
National Remote Sensing Agency (NRSA)
Regional Remote Sensing Service Centers (RRSSC)
Physical Research Laboratory (PRL)
National Mesosphere/Stratosphere Troposphere Radar Facility (NMRF)
CLOUD COMPUTING
when it’s smarter to rent than to buy
INTRODUCTION
The critical factor for the sustainability of an organization:- Better resource Utilization Innovative Solution Higher Productivity
Business solutions of various companies were costly. So, for cost cutting cloud computing came into existence.
Contd…
The “cloud “is a metaphor for the internet.
Cloud computing refers to the computation , software and hardware accessing as well as the data storage services where the end user do not need to have the knowledge of physical location and configuration of the system that provides the services.
e.g.- yahoo email, Gmail etc.
SIMILAR SYSTEM & CONCEPTS
The concepts that revolutionized the cloud computingClustering computing: Here computers are cluster together to form largecomputer
Autonomic Computing:Computer Systems are capable of self- management
Grid computing: Computers are plugged in and the users pay for what they use.
CHARACTERISTICS
Cloud computing exhibits the following key characteristics:
Application Programming: REST-based APIs.
Cost: almost negligible cost .
Device and location independence: end user do not require to have the knowledge of service provider.
Virtualization: all platforms provided to the user are completely virtual.
Multitenancy: enables sharing of resources and costs across a large pool of users .
Security: is more due to centralization of data.
Maintenance: of cloud computing applications is easier.
SERVICE MODELS
Cloud computing providers offer their services according to three fundamental models: Iaas, Paas & Saas.
Contd…
Infrastructure as a service (IaaS):
Cloud providers offer computers– as physical or more often as virtual machines.
To deploy their applications, cloud users install operating system images on the machines as well as their application software.
IaaS Cloud is a platform through which businesses can avail equipment in the form of hardware, servers, storage space etc. at pay-per-use service.
Examples of IaaS include: Amazon Cloud Formation, Rack space Cloud, and Right Scales.
Contd…
Platform as a service (PaaS):
In the PaaS model, cloud providers deliver a computing platform and/or solution stack typically including operating system, programming language execution environment, database, and web server.
Application developers can develop and run their software solutions on a cloud platform.
Examples of PaaS include: Amazon Elastic Beanstalk, Heroku, Engine Yard, Google App Engine, and Microsoft Azure.
Contd…
Software as a service (SaaS):
In this model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients.
The pricing model for SaaS applications is typically a monthly or yearly flat fee per user.
Examples of SaaS include: Google Apps, Quick books Online and Salesforce.com.
Contd… Cloud client : Users access cloud computing using networked client
devices, such as desktop , smart phones , etc. .
Some of these devices - cloud clients - rely on cloud computing for all or a majority of their applications so as to be essentially useless without it.
Some legacy applications are delivered via a screen-sharing technology.
Examples are thin clients and the browser-based Chrome book.
Contd…
DEPLOYMENT MODELS
Contd…
Public cloud: Also known as external cloud . Benefits: no wastage resource and easy , inexpensive
setup.
E.g. IBM blue cloud, sun cloud etc.
Community cloud: Community cloud shares infrastructure between several
organizations from a specific community with common concern.
Contd…
Hybrid cloud:
Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models.
Hybrid clouds lack the flexibility, security and certainty of in-house applications.
Private cloud:
Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally.
ARCHITECTURE
Cloud architecture, the system architecture involve multiple cloud components communicating with each other.Inter Cloud is an interconnected global “cloud of clouds” and an extension of the internet “n/w of n/w” on which it is based.Cloud engineering is an application of engineering discipline of cloud computing . In this there is a great contribution from diverse areas such as software, web , performance , risk engineering.
ISSUESSecurity:• Physical control of the Private Cloud equipment is more secure than having the equipment off site
and under someone else’s control.
Legal:• As it can be expected with any revolutionary change in the landscape of global computing,
certain legal issues arise; everything from trademark infringement, security concerns to the sharing of propriety data resources.
Privacy:• Using a cloud service provider (CSP) can complicate privacy of data because of the extent to
which virtualization for cloud processing (virtual machines) and cloud storage are used to implement cloud service.
Abuse: • This includes password cracking and launching attacks using the purchased services . • In 2009, a banking Trojan illegally used the popular Amazon service as a command and control channel that
issued software updates and malicious instructions to PCs that were infected by the malware.
THANK YOU