SlideShare a Scribd company logo
Cloud Computing
Protocol
Presented By :-
Kartik N. Kalpande
What is Cloud-Computing…?
 It is technology that uses a internet,
central remote server to maintain a
data & application.
 Used to store the data on remote
server securely and retrieved it.
 Ex. Yahoo, Gmail, Hotmail, Rediffmail.
Cloud broken down into 3 categories
 Application
 Storage
 Connectivity
Architecture
Protocols ( What is protocols? )
 set of rules that allow 2 electronics
item to connect and exchange info. to
one another.
 Used for storage, communication, for
encry. ,decryp, networking, security,
user-login management etc etc…..
1. Gossip Protocol
 It is a communication protocol.
 Similarly referred as a epidemic protocol.
 Anti-entropy is used to repairing a data.
 The dissemination protocol used to spread
info.
basically it work by using flooding agent in n/w.
Used for failure detection,
monitoring and
messanging.
 Failure detection - In n/w, one by one they
target the system and remaining sends the
data.
 Messaging - Gossip are rapidly spread &
uses a TCP to wrap the data and transmit
it to correct destination.
 Monitoring – Separate mechanism to
monitor the msg (gossip) spread on it.
2. Connection-less n/w
protocol (CLNP) Works on layer-3 protocol OSI model.
 mechanism of fragmentation(data unit
identification, length of data and offset address).
 Exactly same like IP but basic diff. is that CNLP addr.
Size is 20 bytes as compared to IP(4 byte).
3. State Routing Protocol
(SRP) A router communicate with each other, routing
algo. is used to choose the path to route the info.
 Ex. of this types of protocols are IP and IPX.
 Routing info. Protocol (RIP) is used to know the info.
about path/routing.
4. Internet Group
Management Protocol
(IGMP) Communication protocol used to multicast the
data to the nodes in a n/w via router.
 Can be used for streaming video, gaming over
cloud.
 It operates on n/w layer just like other management
protocol like ICMP.
 Ex. Watching online video over cloud.
5.Secure Shell protocol
(SSHP)
 Cryptographic n/w protocol allow
remote login securely over internet.
 Advantage is remote login with
encryption & access information.
 2 versions  SSH-1 & SSH-2.
Cont…
 The decryption algo. is placed inside a
remote server for decryption of user_id
and password.
 it was a replacement of telnet, Rlogin,
RSH because it encrypt login_id &
password login time.
6. Coverage Enhanced
Ethernet Protocol (CEE)
 N/w traffic & packet loss issues are solved.
 Packet will be loss when new packets are
comes via switch so data will loss so it is
solution over it.
 Advantages – handle packet traffic on
data-link layer, lower cost, for storaging
the packets.
7. Extensible Messaging &
Presence Protocol (XMPP)
 Used for publish subscriber system, video &
file transfer in cloud.
 developed by jabber open source
community in 1999 & its freeware
protocol.
 In dec. 2011 Microsoft released an XMPP
interface for messenger service.
8. Advanced Message
Queuing Protocol (AMQP) Msg/info. are routed in P-t-P manner over cloud.
 Wire less protocol provide description format of
data send on n/w.
 Provide a guarantees of msg delivery & work on
application layer.
 Used in cloud but now-a-days used in Red hat,
Microsoft, Apache etc.
9. Enhanced Interior
Gateway Routing
Protocol (EIGRP)
 Replaced by IGRP in 1993 because didn’t
support of IP classes of IP4 but it supports.
 If router didn’t have a valid path to the
desti.So it discard the packet &
dynamically create a path.
 Features – support load balancing on
parallel linked site.
10. Media Transfer Protocol
(MTP)
 Transfer the media files, audio files, metadata
to & from the portable device over a cloud.
 Actually PTP used to transfer the media files.
 Used for downloading photographs from
cloud.
 Disadvantage- not to transmit the video files so
solution over their AVTP is used.
Cont…
 It initialized the initiators to identify the
capability of device with respect to file
format & functionality.
 MTP is a part of windows media player
from windows NT MTP is used in
Microsoft series.
ConclusionConclusion
Thus we have studied that about cloud computing as
well as its architecture and various cloud protocols that
are used in cloud computing. Basically the protocol is a
set of standard rules through which the two electronic
nodes are connected to each other.
the protocol used in cloud are for various purpose
like encryption of data, communication, data
transmission, audio-video file transmission, remote login
etc. in short we all know about its working and use.
Sitation (Refrence)Sitation (Refrence)
 Epidemic algorithms for replicated database
maintenance. Alan Demers, et al. Proc. 6th
ACM PODC, Vancouver BC, 1987.
 Correctness of a Gossip-based Membership
Protocol. André Allavena, Alan Demers and John
Hopcroft. Proc. 24th ACM Symposium on Principles
of Distributed Computing (PODC 2005).
 Ordered slicing of very large overlay networks. Márk
Jelasity and Anne-Marie Kermarrec. IEEE P2P, 2006.
 Epidemic Broadcast Trees. João Leitão, José
Pereira, Luís Rodrigues. Proc. 26th IEEE International
Symposium on Reliable Distributed
Systems (SRDS'07).
Thank You…..
Have a Nice Day to
you…!

More Related Content

Cloud computing protocol

  • 2. What is Cloud-Computing…?  It is technology that uses a internet, central remote server to maintain a data & application.  Used to store the data on remote server securely and retrieved it.  Ex. Yahoo, Gmail, Hotmail, Rediffmail.
  • 3. Cloud broken down into 3 categories  Application  Storage  Connectivity
  • 5. Protocols ( What is protocols? )  set of rules that allow 2 electronics item to connect and exchange info. to one another.  Used for storage, communication, for encry. ,decryp, networking, security, user-login management etc etc…..
  • 6. 1. Gossip Protocol  It is a communication protocol.  Similarly referred as a epidemic protocol.  Anti-entropy is used to repairing a data.  The dissemination protocol used to spread info. basically it work by using flooding agent in n/w.
  • 7. Used for failure detection, monitoring and messanging.  Failure detection - In n/w, one by one they target the system and remaining sends the data.  Messaging - Gossip are rapidly spread & uses a TCP to wrap the data and transmit it to correct destination.  Monitoring – Separate mechanism to monitor the msg (gossip) spread on it.
  • 8. 2. Connection-less n/w protocol (CLNP) Works on layer-3 protocol OSI model.  mechanism of fragmentation(data unit identification, length of data and offset address).  Exactly same like IP but basic diff. is that CNLP addr. Size is 20 bytes as compared to IP(4 byte).
  • 9. 3. State Routing Protocol (SRP) A router communicate with each other, routing algo. is used to choose the path to route the info.  Ex. of this types of protocols are IP and IPX.  Routing info. Protocol (RIP) is used to know the info. about path/routing.
  • 10. 4. Internet Group Management Protocol (IGMP) Communication protocol used to multicast the data to the nodes in a n/w via router.  Can be used for streaming video, gaming over cloud.  It operates on n/w layer just like other management protocol like ICMP.  Ex. Watching online video over cloud.
  • 11. 5.Secure Shell protocol (SSHP)  Cryptographic n/w protocol allow remote login securely over internet.  Advantage is remote login with encryption & access information.  2 versions  SSH-1 & SSH-2.
  • 12. Cont…  The decryption algo. is placed inside a remote server for decryption of user_id and password.  it was a replacement of telnet, Rlogin, RSH because it encrypt login_id & password login time.
  • 13. 6. Coverage Enhanced Ethernet Protocol (CEE)  N/w traffic & packet loss issues are solved.  Packet will be loss when new packets are comes via switch so data will loss so it is solution over it.  Advantages – handle packet traffic on data-link layer, lower cost, for storaging the packets.
  • 14. 7. Extensible Messaging & Presence Protocol (XMPP)  Used for publish subscriber system, video & file transfer in cloud.  developed by jabber open source community in 1999 & its freeware protocol.  In dec. 2011 Microsoft released an XMPP interface for messenger service.
  • 15. 8. Advanced Message Queuing Protocol (AMQP) Msg/info. are routed in P-t-P manner over cloud.  Wire less protocol provide description format of data send on n/w.  Provide a guarantees of msg delivery & work on application layer.  Used in cloud but now-a-days used in Red hat, Microsoft, Apache etc.
  • 16. 9. Enhanced Interior Gateway Routing Protocol (EIGRP)  Replaced by IGRP in 1993 because didn’t support of IP classes of IP4 but it supports.  If router didn’t have a valid path to the desti.So it discard the packet & dynamically create a path.  Features – support load balancing on parallel linked site.
  • 17. 10. Media Transfer Protocol (MTP)  Transfer the media files, audio files, metadata to & from the portable device over a cloud.  Actually PTP used to transfer the media files.  Used for downloading photographs from cloud.  Disadvantage- not to transmit the video files so solution over their AVTP is used.
  • 18. Cont…  It initialized the initiators to identify the capability of device with respect to file format & functionality.  MTP is a part of windows media player from windows NT MTP is used in Microsoft series.
  • 19. ConclusionConclusion Thus we have studied that about cloud computing as well as its architecture and various cloud protocols that are used in cloud computing. Basically the protocol is a set of standard rules through which the two electronic nodes are connected to each other. the protocol used in cloud are for various purpose like encryption of data, communication, data transmission, audio-video file transmission, remote login etc. in short we all know about its working and use.
  • 20. Sitation (Refrence)Sitation (Refrence)  Epidemic algorithms for replicated database maintenance. Alan Demers, et al. Proc. 6th ACM PODC, Vancouver BC, 1987.  Correctness of a Gossip-based Membership Protocol. André Allavena, Alan Demers and John Hopcroft. Proc. 24th ACM Symposium on Principles of Distributed Computing (PODC 2005).  Ordered slicing of very large overlay networks. Márk Jelasity and Anne-Marie Kermarrec. IEEE P2P, 2006.  Epidemic Broadcast Trees. João Leitão, José Pereira, Luís Rodrigues. Proc. 26th IEEE International Symposium on Reliable Distributed Systems (SRDS'07).
  • 21. Thank You….. Have a Nice Day to you…!