Cloud computing protocol
- 2. What is Cloud-Computing…?
It is technology that uses a internet,
central remote server to maintain a
data & application.
Used to store the data on remote
server securely and retrieved it.
Ex. Yahoo, Gmail, Hotmail, Rediffmail.
- 5. Protocols ( What is protocols? )
set of rules that allow 2 electronics
item to connect and exchange info. to
one another.
Used for storage, communication, for
encry. ,decryp, networking, security,
user-login management etc etc…..
- 6. 1. Gossip Protocol
It is a communication protocol.
Similarly referred as a epidemic protocol.
Anti-entropy is used to repairing a data.
The dissemination protocol used to spread
info.
basically it work by using flooding agent in n/w.
- 7. Used for failure detection,
monitoring and
messanging.
Failure detection - In n/w, one by one they
target the system and remaining sends the
data.
Messaging - Gossip are rapidly spread &
uses a TCP to wrap the data and transmit
it to correct destination.
Monitoring – Separate mechanism to
monitor the msg (gossip) spread on it.
- 8. 2. Connection-less n/w
protocol (CLNP) Works on layer-3 protocol OSI model.
mechanism of fragmentation(data unit
identification, length of data and offset address).
Exactly same like IP but basic diff. is that CNLP addr.
Size is 20 bytes as compared to IP(4 byte).
- 9. 3. State Routing Protocol
(SRP) A router communicate with each other, routing
algo. is used to choose the path to route the info.
Ex. of this types of protocols are IP and IPX.
Routing info. Protocol (RIP) is used to know the info.
about path/routing.
- 10. 4. Internet Group
Management Protocol
(IGMP) Communication protocol used to multicast the
data to the nodes in a n/w via router.
Can be used for streaming video, gaming over
cloud.
It operates on n/w layer just like other management
protocol like ICMP.
Ex. Watching online video over cloud.
- 11. 5.Secure Shell protocol
(SSHP)
Cryptographic n/w protocol allow
remote login securely over internet.
Advantage is remote login with
encryption & access information.
2 versions SSH-1 & SSH-2.
- 12. Cont…
The decryption algo. is placed inside a
remote server for decryption of user_id
and password.
it was a replacement of telnet, Rlogin,
RSH because it encrypt login_id &
password login time.
- 13. 6. Coverage Enhanced
Ethernet Protocol (CEE)
N/w traffic & packet loss issues are solved.
Packet will be loss when new packets are
comes via switch so data will loss so it is
solution over it.
Advantages – handle packet traffic on
data-link layer, lower cost, for storaging
the packets.
- 14. 7. Extensible Messaging &
Presence Protocol (XMPP)
Used for publish subscriber system, video &
file transfer in cloud.
developed by jabber open source
community in 1999 & its freeware
protocol.
In dec. 2011 Microsoft released an XMPP
interface for messenger service.
- 15. 8. Advanced Message
Queuing Protocol (AMQP) Msg/info. are routed in P-t-P manner over cloud.
Wire less protocol provide description format of
data send on n/w.
Provide a guarantees of msg delivery & work on
application layer.
Used in cloud but now-a-days used in Red hat,
Microsoft, Apache etc.
- 16. 9. Enhanced Interior
Gateway Routing
Protocol (EIGRP)
Replaced by IGRP in 1993 because didn’t
support of IP classes of IP4 but it supports.
If router didn’t have a valid path to the
desti.So it discard the packet &
dynamically create a path.
Features – support load balancing on
parallel linked site.
- 17. 10. Media Transfer Protocol
(MTP)
Transfer the media files, audio files, metadata
to & from the portable device over a cloud.
Actually PTP used to transfer the media files.
Used for downloading photographs from
cloud.
Disadvantage- not to transmit the video files so
solution over their AVTP is used.
- 18. Cont…
It initialized the initiators to identify the
capability of device with respect to file
format & functionality.
MTP is a part of windows media player
from windows NT MTP is used in
Microsoft series.
- 19. ConclusionConclusion
Thus we have studied that about cloud computing as
well as its architecture and various cloud protocols that
are used in cloud computing. Basically the protocol is a
set of standard rules through which the two electronic
nodes are connected to each other.
the protocol used in cloud are for various purpose
like encryption of data, communication, data
transmission, audio-video file transmission, remote login
etc. in short we all know about its working and use.
- 20. Sitation (Refrence)Sitation (Refrence)
Epidemic algorithms for replicated database
maintenance. Alan Demers, et al. Proc. 6th
ACM PODC, Vancouver BC, 1987.
Correctness of a Gossip-based Membership
Protocol. André Allavena, Alan Demers and John
Hopcroft. Proc. 24th ACM Symposium on Principles
of Distributed Computing (PODC 2005).
Ordered slicing of very large overlay networks. Márk
Jelasity and Anne-Marie Kermarrec. IEEE P2P, 2006.
Epidemic Broadcast Trees. João Leitão, José
Pereira, Luís Rodrigues. Proc. 26th IEEE International
Symposium on Reliable Distributed
Systems (SRDS'07).