cloud computing protocol
TRANSCRIPT
Cloud Computing Protocol
Presented By :-Kartik N. Kalpande
What is Cloud-Computing…?
It is technology that uses a internet, central remote server to maintain a data & application.
Used to store the data on remote server securely and retrieved it.
Ex. Yahoo, Gmail, Hotmail, Rediffmail.
Cloud broken down into 3 categories
Application
Storage
Connectivity
Protocols ( What is protocols? )
set of rules that allow 2 electronics item to connect and exchange info. to one another.
Used for storage, communication, for encry. ,decryp, networking, security, user-login management etc etc…..
1. Gossip Protocol
It is a communication protocol.
Similarly referred as a epidemic protocol.
Anti-entropy is used to repairing a data.
The dissemination protocol used to spread info. basically it work by using flooding agent in n/w.
Used for failure detection, monitoring and messanging. Failure detection - In n/w, one by one
they target the system and remaining sends the data.
Messaging - Gossip are rapidly spread & uses a TCP to wrap the data and transmit it to correct destination.
Monitoring – Separate mechanism to monitor the msg (gossip) spread on it.
2. Connection-less n/w protocol (CLNP) Works on layer-3 protocol OSI model.
mechanism of fragmentation(data unit identification, length of data and offset address).
Exactly same like IP but basic diff. is that CNLP addr. Size is 20 bytes as compared to IP(4 byte).
3. State Routing Protocol (SRP) A router communicate with each other, routing algo. is used to choose the path to route the info.
Ex. of this types of protocols are IP and IPX.
Routing info. Protocol (RIP) is used to know the info. about path/routing.
4. Internet Group Management Protocol (IGMP) Communication protocol used to multicast the data to the nodes in a n/w via router.
Can be used for streaming video, gaming over cloud.
It operates on n/w layer just like other management protocol like ICMP.
Ex. Watching online video over cloud.
5.Secure Shell protocol (SSHP)
Cryptographic n/w protocol allow remote login securely over internet.
Advantage is remote login with encryption & access information.
2 versions SSH-1 & SSH-2.
Cont…
The decryption algo. is placed inside a remote server for decryption of user_id and password.
it was a replacement of telnet,
Rlogin, RSH because it encrypt login_id & password login time.
6. Coverage Enhanced Ethernet Protocol (CEE)
N/w traffic & packet loss issues are solved.
Packet will be loss when new packets are comes via switch so data will loss so it is solution over it.
Advantages – handle packet traffic on
data-link layer, lower cost, for storaging the packets.
7. Extensible Messaging & Presence Protocol (XMPP)
Used for publish subscriber system, video & file transfer in cloud.
developed by jabber open source community in 1999 & its freeware protocol.
In dec. 2011 Microsoft released an XMPP interface for messenger service.
8. Advanced Message Queuing Protocol (AMQP) Msg/info. are routed in P-t-P manner over cloud.
Wire less protocol provide description format of data send on n/w.
Provide a guarantees of msg delivery & work on application layer.
Used in cloud but now-a-days used in Red hat, Microsoft, Apache etc.
9. Enhanced Interior Gateway RoutingProtocol (EIGRP) Replaced by IGRP in 1993 because didn’t
support of IP classes of IP4 but it supports.
If router didn’t have a valid path to the desti.So it discard the packet & dynamically create a path.
Features – support load balancing on parallel linked site.
10. Media Transfer Protocol (MTP) Transfer the media files, audio files, metadata
to & from the portable device over a cloud.
Actually PTP used to transfer the media files.
Used for downloading photographs from cloud.
Disadvantage- not to transmit the video files so solution over their AVTP is used.
Cont…
It initialized the initiators to identify the capability of device with respect to file format & functionality.
MTP is a part of windows media player from windows NT MTP is used in Microsoft series.
ConclusionConclusion Thus we have studied that about cloud computing as well as its architecture and various cloud protocols that are used in cloud computing. Basically the protocol is a set of standard rules through which the two electronic nodes are connected to each other. the protocol used in cloud are for various purpose like encryption of data, communication, data transmission, audio-video file transmission, remote login etc. in short we all know about its working and use.
Sitation (Refrence)Sitation (Refrence) Epidemic algorithms for replicated database
maintenance. Alan Demers, et al. Proc. 6th ACM PODC, Vancouver BC, 1987.
Correctness of a Gossip-based Membership Protocol. André Allavena, Alan Demers and John Hopcroft. Proc. 24th ACM Symposium on Principles of Distributed Computing (PODC 2005).
Ordered slicing of very large overlay networks. Márk Jelasity and Anne-Marie Kermarrec. IEEE P2P, 2006.
Epidemic Broadcast Trees. João Leitão, José Pereira, Luís Rodrigues. Proc. 26th IEEE International Symposium on Reliable Distributed Systems (SRDS'07).
Thank You…..Have a Nice Day to you…!