This website uses cookies to ensure you have the best experience. Learn more

Cloud Networking Essay

3185 words - 13 pages

Description of cloud:
A set of pooled computing resources, delivered over the web, powered by software. Cloud computing a form of computing that involves the interaction of several virtualized resources, meaning that many servers are connecting and sharing information that can expand and contract across servers depending on the amount of servers needed to manage the amount of traffic on various sites. Cloud computing is often provided “as a service” over the internet, typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS). Maturing virtualization in information technology systems has enabled increased implementations
of the ...view middle of the document...

Projects attempting to implement cloud based solutions can choose between a variety of solutions, often combined packages of software and hardware that have been
optimized for the specific purpose. However, all of these solutions require certain performance parameters to enable networks that will connect the user and the cloud service
in a manner that realizes the service’s full potential.

History:
The origin of the term cloud computing is obscure, but it appears to derive from the practice of using drawings of stylized clouds to denote networks in diagrams of computing and communications systems. The wordcloud is used as a metaphor for the Internet, based on the standardized use of a cloud-like shape to denote a network on telephony schematics and later to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents. The cloud symbol was used to represent the Internet as early as 1994.
In the 1990s, telecommunications companies who previously offered primarily dedicated point-to-point data circuits, began offering virtual private network  (VPN) services with comparable quality of service but at a much lower cost. By switching traffic to balance utilization as they saw fit, they were able to utilize their overall network bandwidth more effectively. The cloud symbol was used to denote the demarcation point between that which was the responsibility of the provider and that which was the responsibility of the users. Cloud computing extends this boundary to cover servers as well as the network infrastructure.
The underlying concept of cloud computing dates back to the 1950s; when large-scale mainframe became available in academia and corporations, accessible via thin  clients / terminal computers. Because it was costly to buy a mainframe, it became important to find ways to get the greatest return on the investment in them, allowing multiple users to share both the physical access to the computer from multiple terminals as well as to share the CPU time, eliminating periods of inactivity, which became known in the industry as time-sharing.
As computers became more prevalent, scientists and technologists explored ways to make large-scale computing power available to more users through time sharing, experimenting with algorithms to provide the optimal use of the infrastructure, platform and applications with prioritized access to the CPU and efficiency for the end users.[9]
John McCarthy opined in the 1960s that "computation may someday be organized as a public utility. Almost all the modern-day characteristics of cloud computing (elastic provision, provided as a utility, online, illusion of infinite supply), the comparison to the electricity industry and the use of public, private, government, and community forms, were thoroughly explored in Douglas Parkhills 1966 book, The Challenge of the Computer Utility. Other scholars have shown that cloud computing's roots go all the way back to the 1950s...

Other Papers Like Cloud Networking

Information Systems Week 2 Quiz Essay

999 words - 4 pages . meaningful information. output. Instructor Explanation: p. 16 Points Received: 1 of 1 Comments: Question 6. Question : Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's Student Answer: data management environment. networked environment

Cis 510 Discussion 1 Essay

814 words - 4 pages Compare the direction of current and past trends in both communication and networking and explain how these changes have impacted business. The buzz word that is currently doing the rounds of Information Technology industry is 'technology-driven transformation'. Businesses interpret this as using the technology to redefine the services that they can offer at lower costs, which would increase the revenues and boost the profits. As the scope of

Strategic Management

901 words - 4 pages , 3431 followers to get the analysis of customer required services and 522 ideas approved for funding. It also aimed that with new networking technology (eg: Internet, mobility, social media and networking ) a virtual platform is build up for innovation. The third aim is to redefine the usability aspect of internet and technology via a digital ecosystem. For all the above aims the solution was to provide solution and services in all areas with

Kudler

1121 words - 5 pages experiences and share comments with Kudler and other potential customers. We recommend CRM and social networking to optimize the success of Kudler’s programs and business plan. We also suggest an end-to-end suite design for all modules including new purchase, sale, and inventory management modules. It would be beneficial for Kudler to explore the opportunities of cloud-based and multi-channel management. We highly recommend Kudler to bring together

Mis 535 Study Guide

1168 words - 5 pages organization * Database design * Data quality * DBMS * Data warehouses * Data definition, data dictionary, data languages * TCO D * Digital networking technologies * Types of networks * Internet services and tools * Corporate networks and cloud computing * Bluetooth, Wi-Fi, WiMax * RFID * TCO E * Infrastructure components * Supply chain management

Riordan Manufacturing Sdlc

835 words - 4 pages of malware or spyware corruption. Riordan’s proprietary information must be protected against hackers that can either sell the information to the highest competitor or corrupt their data. Networking Networking is essential for seamless connectivity between locations and the trainer. To best serve the internal clients, the networks require frequent back-ups and current software. Cloud technology provides a better solution for shared software

Ebusiness Assignment

6150 words - 25 pages major developments in eBusiness. In this section the author will be discussing eBusiness developments area, which will include: * Web 1,2,3 * Mobile Technology * Cloud Computing * Fibre Optics * Big Data, Data Mining, Data Warehousing, Data Analytics * Social Media Web 1.0 refers to the World Wide Web, which was made up of Web pages connected by hyperlinks. In Web 1.0 there is only limited interaction between sites

Nokia Company

1020 words - 5 pages connection is encrypted with standard HTTPS protocol. Additionally, web reversed proxy technology with TLS security is supported for web-based access via SSL VPN gateways. All networking traffic with critical business applications, such as Exchange Server and Share Point, is encrypted using 128-bit or 256-bit AES encryption. This applies to on-premise deployments and cloud-based applications, such as Office 365 for enterprises. Third-party or custom

Cmgt/430 Quiz

885 words - 4 pages -to-peer protocol that divides a file into many pieces and is used to download very large files is: a. BitTorrent b. http c. snmp d. ftp e. cloud servers 17. Which of the following statements is FALSE: a. You need to have a dynamic IP address to view dynamic web pages b. Dynamic IP addresses are temporarily assigned c. Internet Service Providers provide their customers

Rayhana Sultabna

986 words - 4 pages | | |   | Points Received: | 1 of 1 |   | Comments: | | | |  2. | Question : | Disintermediation | |   | Student Answer: | |  results from the speed of the Internet. |   | | |  is defined as the elimination of layers in the distribution process. |   | | |  is a result of social networking. |   | | |  All of the above |   | Instructor Explanation: | p. 379 | | |   | Points Received: | 1 of 1 |   | Comments

Securing And Protecting Information

1903 words - 8 pages hidden password that is accessible only through authentication, a synchronous dynamic password that utilizes a timer, or a one-time password that is generated for a single use and do not require a timer. These types of device are effective at protecting data even if misplaced or stolen. Virtual private networks (VPNs) and the Cloud can also be used to secure data as part of an organization’s information security infrastructure. A virtual

Related Essays

Nt1310 Unit 2 Lab 1 Essay

915 words - 4 pages also services virtual networking that you can also base a VPC (Virtual private cloud) within your virtual network for the highest ends of your virtual network security. Another cloud based service is Cloud SQL second generation which is a service based upon the recording and graphing of data used and speeds across networks and virtual networks across your cloud based services. Google boasts its future proof settings with its servers but it also

Investment In Cloud Startups Essay

551 words - 3 pages Introduction and Objective: Indian Angel Network, India's first angel network is a platform for entrepreneurs and has a unique model of an incubator which is investor led and based on value added mentoring. The Network has met with early successes and has already invested in companies across multiple sectors and geographies, and helping create ventures which give 5x returns over 1 to 2 years. The project deals with analysing the Cloud start

Ebay Essay

774 words - 4 pages networks and key networking technologies? What are the main telecommunications transmission media and types of networks? How does the Internet and Internet technology work and how do they support communication and e-business? What are the principal technologies and standards for wireless networking, communication, and Internet access? Why are radio frequency identification (RFID) and wireless sensor networks valuable for business? Dr

Big Data Challenge Essay

945 words - 4 pages Cloud into Its Networks The ability to collectively harness the wealth of data being mined was invaluable. Volvo collects terabytes of data from embedded sensors in their cars, from their customer relationship management (CRM) systems, from dealerships, product development and design systems and from their production/factory floors. Volvo then, via the cloud, transfers and archives this Big Data to its Volvo Data Warehouse where it can be