Lecture 6
Lecture 6
Infrastructure and
Services
LECTURE 6
PREPARED BY: HASS AN NAWAZ
Cloud Computing Characteristics
1- On-Demand Self-Service
This characteristic means that users can automatically provision computing resources like server
time, storage, and network capabilities as needed, without requiring direct interaction with the
cloud service provider. It allows for greater flexibility and efficiency since resources can be
quickly allocated or released.
Example: Imagine a startup that suddenly needs additional servers to handle a spike in user traffic.
With traditional IT, they would have to purchase new hardware, install it, and configure it, which
could take weeks. With cloud computing, the startup can quickly log in to a cloud service like AWS or
Azure and provision new virtual servers in minutes, without any manual intervention. This process is
automated through a simple web interface or API call.
Real-World Example: A Pakistani e-commerce startup like Daraz might need additional servers to
handle traffic spikes during sales like 11.11 or Black Friday. Instead of buying new hardware, they use
cloud providers like Amazon Web Services (AWS) or local services such as PTCL's Cloud Services. They
can easily scale up their server capacity on-demand during peak times and scale down afterward,
optimizing costs.
2 - Broad Network Access
Cloud computing resources are accessible over the network (internet) and can be used by
various devices such as smartphones, tablets, laptops, and desktop computers. The idea is that
the service should be accessible anytime, anywhere, provided there is an internet connection.
This means that you don’t have to worry about working remotely—you can simply log into your
account from wherever there’s an internet connection! These fundamental characteristics of
Cloud Computing also enable them to upload data to the cloud from anywhere.
Examples
Example : Think of services like Google Drive or Microsoft OneDrive. You can access your files
from any device—be it your home computer, work laptop, or even your smartphone. This
convenience is made possible because the files are stored in the cloud and not tied to any single
device
Example : Think of JazzCash or Easypaisa, which are digital financial services widely used across
Pakistan. They rely on cloud-based infrastructure that can be accessed through smartphones,
laptops, or desktops. Customers can transfer money, pay bills, or recharge accounts from
anywhere, at any time, as long as they have an internet connection.
3- Resource Pooling
Cloud providers use a multi-tenant model to serve multiple customers. Resources such as
storage, processing power, and memory are pooled together and dynamically allocated to users
based on demand. This model offers efficiency and cost savings.
Example: Think of a hotel where rooms (resources) are available to different guests (customers).
Each guest is assigned a room, but they don’t see or interact with the other rooms. Similarly, in the
cloud, different companies might share the same physical server, but they have their own separate
virtual environments.
Real-World Example: A company using a cloud service like AWS or Google Cloud shares physical
resources with other companies. However, each company's data and applications are securely
isolated from the others. This efficient resource use allows cloud providers to offer lower prices to
customers.
4- Rapid Elasticity
Cloud computing can quickly scale resources up or down according to demand. This
characteristic provides flexibility for businesses that experience variable workloads.
Rapid elasticity refers to the ability of a cloud service provider (CSP) like Amazon Web Services
(AWS) or Microsoft Azure to add more capacity. The ability to quickly scale up and down
capacity is perhaps the most important characteristic of cloud computing. Because the cloud
provider owns the hardware, they can adjust resources as needed to accommodate peak loads.
Example: Consider an online retail store that experiences high traffic during holiday sales or special
events. With cloud computing, the store can automatically add more servers to handle the traffic
surge and then reduce the number of servers once the traffic subsides. This scalability ensures
optimal performance without overcommitting resources.
Real-World Example: Zoom, the video conferencing platform, experienced a massive increase in
users during the COVID-19 pandemic. With cloud services, Zoom could rapidly scale up its server
capacity to accommodate the sudden surge in demand, ensuring uninterrupted service to millions of
users globally.
5 - Measured Service
This is a characteristic of cloud computing that refers to the ability to pay for only what you use.
You are billed for the resources you have used, rather than paying for your entire infrastructure
based on capacity.
Example: Imagine using electricity at home. You are billed based on the number of kilowatt-
hours you use. Similarly, in cloud computing, if you use more storage or processing power, you
will be billed more. If you use less, your costs will go down.
6 - Virtualization
The ability to run multiple operating systems on a single server. This can be done by using virtual
machines, which are software that allows you to run an entire operating system on a single
machine.
Example: Think of a single high-powered computer being divided into several smaller,
independent computers. Each of these "mini-computers" can run its own operating system and
applications, independent of the others.
7 - Security
Data security is one of the best characteristics of Cloud Computing. Cloud computing features
provide security by using multiple layers of protection, including firewalls, encryption, and
identity management systems. It provides enhanced security for your business data and
applications by leveraging standard practises in information security.
Example: Banks in Pakistan, like MCB or Allied Bank, use cloud computing for parts of their
infrastructure but must comply with the State Bank of Pakistan (SBP) regulations on data
security. Cloud providers offer encryption, secure access controls, and regular audits to ensure
that customer data, especially sensitive financial information, remains secure and compliant
with local laws.