Tuesday, November 8, 2016

Chapter 6

The chapter begins with why the cloud will be utilize more and more in the future. It will also discuss how technology makes the cloud work and the ways organizations can use it. The chapter goes overs local networks and how it functions with the web. This also includes the purpose of the cloud and its basic technologies. Finally, it will review how each organizations use the cloud, the basic steps of setting up the cloud and its security.
Q1: Why is the cloud the future for most organizations?
Organizations are moving their computing infrastructure to the cloud.  Leasing computing infrastructure from the cloud will become common practice. The cloud itself is an elastic leasing of pooled computer resources via Internet. Elastic means it automatically adjusts for unpredictable demand and limits financial risks. Now pooled is the same physical hardware itself or economies of scale, for instance like Amazon.com’s CloudFront. Without increase in servers, response time of seconds or more, is far too long to maintain attention of viewer. So economies of scale consider the average cost decreases as size of operation increases. The major cloud vendors operate enormous data centers such as web farms. The cloud is preferred to in-house hosting because of the small capital requirements, speedy development and known cost structure. This also includes no obsolescence, superior flexibility and adaptability to grow or fluctuating demand.  However, the negatives of the cloud are dependency on vendors, loss of control over data location and little security measures. The cloud is used now because of cheap processors, essentially free data communication and storage. The cloud also uses virtualization technology, internet-based standards enable flexible and standardized processing capabilities. The cloud doesn’t make sense when the law or standard industry practice require physical control or possession of the data. For instance, a financial institution is legally required to maintain physical control over its data.
Q2: What network technology supports the cloud?
There are four basic types of computer network technology that support the cloud. Personal area network helps devices connected around a single person. The local sear network are computers connected at a single physical site. Wide area network are computers connected between two or more separated sites. Finally, another basic type of network is the internet and internets which is networks of networks. For example, a typical small home office LAN like most computers today would support 10/100/1000 of Ethernet. There are thee various LAN Protocol with different speeds and connections, such as wired or wireless LAN. Also Bluetooth transmits data short distances and can connect to a computer, keyboard, mouse, printer, smartphones and cars. Communications speeds expressed in bits, memory sizes in bytes. For example, communications equipment can be represented by K(ilo) = 1,000, M(ega) = 1,000,000 and G(iga) = 1,000,000,000.  Connecting your LAN to the internet how important ISP functions. The three are to provide legitimate Internet address, provide gateway to Internet and pay access fees and other charges to telecoms. Gateway function is when a ISP receives the communications from your computer and passes them on to the Internet, and receives communications from the Internet and passes them to you.
Q3: How does the cloud work?
The cloud resides in the internet so assume you send a message to a server somewhere. The message is too big to travel in one piece, so it’s broken into packets and each packet passes along from WAN to WAN until it reaches destination. Once all packets arrive, message reconstructed, delivered to server for processing. All accomplished by computers and data communications devices that most likely have not interacted before. Now the hop is the movement from one network to another. Carriers are messages, broken into packets. These Packets move across the Internet, passing through networks owned by telecom carriers. So peering agreements are carriers that freely exchange traffic amongst themselves without paying access fees. Net neutrality principle considers all data is treated both equally however the problem is some people use more bandwidth than others.
IP Addresses and Domain Names:
There are two internet addressing, Public IP addresses and Private IP addresses. Public IP addresses Identifies a unique device on Internet and is assigned by ICANN (Internet Corporation for Assigned Names and Numbers. Private IP addresses identifies a device on a private network, usually a LAN and the assignment LAN is controlled. The purpose is these protocols manage traffic as it passes across an internet /Internet. Most important protocol in transport layer is TCP. Private/public IP address scheme two major benefits attackers cannot send attack packets to private IP addresses. Most common IP addresses format is IPv4. A domain name is a unique name affiliated with a public IP address, dynamic affiliation of domain names with IP addresses and can have multiple domain names for same IP address. A URL (Uniform Resource Locator) is an Internet address protocol, such as http:// or ftp:// followed by a domain name or public IP address. ICANN administers system for assigning names to IP addresses. Domain name a worldwide-unique name affiliated with a public IP address. Affiliation of domain names with IP addresses is dynamic. Owner of domain name can change affiliated IP addresses at its discretion.
Three Tier Architecture:
Almost all e-commerce applications use a three-tier architecture. First, user tier consists of computers, phones, other devices with browsers that request and process Web pages. Second, a server tier consists of computers running Web servers and application programs. Finally, a database tier consists of computers running a DBMS that processes SQL requests to retrieve and store data. So a commerce server is an application program that runs on server-tier computer. Receives requests from users via Web server, takes some action, and returns a response to users. Typical commerce server functions are to obtain product data from a database, manage items in a shopping cart, and coordinate checkout process. Only Internet protocols a business professional likely to encounter are at application layer. These are four standards that are used extensively for Web services and the cloud: WSDL, SOAP, XML and JSON. 
Four Standards of Web Services and Cloud
Web Services Description Language (WSDL) is the standard for describing services, inputs, outputs, other data supported by a Web service. Documents coded machine readable and used by developer tools for creating programs to access the service. SOAP is a protocol for requesting Web services and for sending responses to Web service requests. Extensible Markup Language is used for transmitting documents. Contains metadata to validate format and completeness of a document, includes considerable overhead. JavaScript Object Notation (JSON) is a markup language used for transmitting documents. Contains little metadata. Preferred for transmitting volumes of data between servers and browsers. While notation in format of JavaScript objects, JSON documents can be processed by any language
Q4: How do organizations use the cloud?
Organizations can use the cloud in several different ways. By far most popular, is to obtain cloud services from cloud service vendors. The three fundamental of cloud types are SaaS, PassS and laaS. Content delivery networks from cloud vendors stores user data in many different geographical locations and makes data available on demand. It also can have specialized type of PaaS, but usually considered in its own category, minimizes latency and is used to store and deliver content seldom changed.
Q5: How can Falcon Security use the cloud?
Absent some unknown factor such as a federal tax on Internet traffic. Individuals on iCloud or Google Grid, to small groups using Office 365, to Small companies like Falcon Security Parts using PaaS, to huge organizations using IaaS.

Q6: How can organizations use cloud services securely?
Organizations realize the benefits of cloud technology without succumbing to those threats. VPN technology uses public Internet to create appearance of a private connection on secure network. Virtual means something that appears to exist but, in fact, does not. Remote Access using VPN is an apparent connection as it appears to the remote user. Accessing a private cloud over a virtual private network is when a VPN client software encrypts messages so their contents are protected from invasions. Private clouds provide security within the organizational infrastructure but do not provide secure access from outside that infrastructure. In order to provide such access, organizations set up a VPN and users employ it to securely access the private cloud. Organization can store most sensitive data on own infrastructure, and store less sensitive data on VPC. Thus, organizations required to have physical control over some of their data can place it on own servers and locate rest on VPC.
Q7: 2026?

Cloud services new categories of work that is faster, more secure, easier to use, cheaper. Fewer organizations own their computing infrastructure. More pooling of servers across organizations and overall size of the cloud gets bigger. Individuals, small businesses, large organizations obtain elastic resources at very low cost. Remote action systems: Telediagnosis, Telesurgery and Telelaw enforcement which provide services in dangerous locations.

No comments:

Post a Comment