Module: 2 Web Server Hardware and Software

Total Page:16

File Type:pdf, Size:1020Kb

Module: 2 Web Server Hardware and Software MODULE: 2 WEB SERVER HARDWARE AND SOFTWARE A server is a system (software and suitable computer hardware) that responds to requests across a computer network to provide, or help to provide, a network service. Servers can be run on a dedicated computer, which is also often referred to as 'the server', but many networked computers are capable of hosting servers. In many cases a computer can provide several services and have several servers running. A server is any computer used to provide (or “serve”) files or make programs available to other computers connected to it through a network (such as a LAN or a WAN). The software that the server computer uses to make these files and programs available to the other computers is sometimes called server software. Sometimes this server software is included as part of the operating system that is running on the server computer. Thus, some information systems professionals informally refer to the operating system software on a server computer as server software, a practice that adds considerable confusion to the use of the term “server.” In short, Server refers to a computer or device on a network that manages network resources. Types of servers In a general network environment the following types of servers may be found. Application server, a server dedicated to running certain software applications Catalog server, a central search point for information across a distributed network Communications server, carrier-grade computing platform for communications networks Compute server, a server intended for intensive (esp. scientific) computations Database server, provides database services to other computer programs or computers Fax server, provides fax services for clients File server, provides remote access to files Game server, a server that video game clients connect to in order to play online together Home server, a server for the home Print server, provides printer services Proxy server, acts as an intermediary for requests from clients seeking resources from other servers Sound server, provides multimedia broadcasting, streaming. Stand-alone server, a server on a Windows network that neither belongs to nor governs a Windows domain Web server, a server that HTTP clients connect to in order to send commands and receive responses along with data contents Web server can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver web content that can be accessed through the Internet. The most common use of web servers is to host websites, but there are other uses such as gaming, data storage or running enterprise applications. The primary function of a web server is to deliver web pages on the request of clients using the Hypertext Transfer Protocol (HTTP). This means delivery of HTML documents and any additional content that may be included by a document, such as images, style sheets and scripts. Web servers are not always used for serving the World Wide Web. They can also be found embedded in devices such as printers, routers, webcams and serving only a local network. The web server may then be used as a part of a system for monitoring and/or administering the device in question. This usually means that no additional software has to be installed on the client computer; since only a web browser is required. BY: VIKRAM.G.B 1 Lecturer, P.G Dept of Commerce Vivekananda Degree College, Bangalore-55 Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address and possibly a domain name. For example, if you enter the URL http://www.pcwebopedia.com/index.html in your browser, this sends a request to the Web server whose domain name is pcwebopedia.com. The server then fetches the page named index.html and sends it to your browser. Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet. There are many Web server software applications, including public domain software from NCSA and Apache, and commercial packages from Microsoft, Netscape and others. Web Client/Server Communication: When a person uses a Web browser to visit a Web site, the Web browser (also known as a Web client) requests files from the Web server at the company or organization that operates the Web site. Using the Internet as the transportation medium, the request is formatted by the browser using HTTP and sent to the server computer. A moment later, when the server receives the request, it retrieves the file containing the Web page or other information that the client requested, formats it using HTTP, and sends it back to the client over the Internet. Two-tier client/server architecture: Typical request message from a client to a server consists of three major parts: request line, optional request headers, and an optional entity body. This kind architecture has only one client and one server message that a Web client sends to request a file or files from a Web server Three-tier and N-tier client/server architectures: Three-tier architecture extends the two-tier architecture to allow additional processing to occur before the Web server responds to the Web client’s request. Higher-order architectures - that is, those that have more than three tiers - are usually called n-tier architectures. BY: VIKRAM.G.B 2 Lecturer, P.G Dept of Commerce Vivekananda Degree College, Bangalore-55 Operating Systems for Web Servers Most Web servers run on computers that use one of the following operating systems: Microsoft Windows NT Server, Microsoft Windows 2000 or 2003 Server products, Linux, or One of several UNIX-based operating systems, such as Solaris or FreeBSD. Many companies believe that Microsoft server products are simpler for their information systems staff to learn and use than UNIX-based systems. Other companies worry about the security weaknesses caused by the tight integration between application software and the operating system in Microsoft products. UNIX based Web servers are more popular, and many users believe that UNIX is a more secure operating system on which to run a Web server. Web Server Software Computer software, or just software, is any set of machine-readable instructions (most often in the form of a computer program) that directs a computer's processor to perform specific operations. Software is a general term. It can refer to all computer instructions in general or to any specific set of computer instructions. It is inclusive of both machine instructions (the binary code that the processor understands) and source code (more human-understandable instructions that must be rendered into machine code by compilers or interpreters before being executed). Web server software includes a series of complex tools and programs that come together to create and manage a Web server. These tools range from programming language protocols to file transfer protocol programs, which allow programmers to customize their Web servers and provide unique experiences for their users from each of their Web pages. Web server software is used to edit and create Web pages along with various other HTTP formatted files. The most popular Web server programs in use today: Apache HTTP Server, Microsoft Internet Information Server (IIS), and Sun Java System Web Server (JSWS) (often called by its former names, Sun ONE, iPlanet Enterprise Server and Netscape Enterprise Server). Below is the percentage of Websites using different Web Server Software’s:- Apache 62.3%, Microsoft-IIS 16.6%, Nginx 15.7%, LiteSpeed1.9%, Google Servers1.4%, Tomcat 0.7%, Lighttpd 0.5%, IBM Servers 0.4%, Yahoo Traffic Server 0.2%, Oracle Servers 0.2%, Zope 0.1%, Resin0.1%, Zeus0.1% Apache HTTP Server:- The Apache HTTP Server Project is a collaborative software development effort aimed at creating a robust, commercial-grade, feature full and freely-available source code implementation of an HTTP (Web) server. The project is jointly managed by a group of volunteers located around the world, using the Internet and the Web to communicate, plan, and develop the server and its related documentation. This project is part of the Apache Software Foundation. In addition, hundreds of users have contributed ideas, code, and documentation to the project. This file is intended to briefly describe the history of the Apache HTTP Server and recognize the many contributors. In February of 1995, the most popular server software on the Web was the public domain HTTP daemon developed by Rob McCool at the National Center for Supercomputing Applications, University of Illinois, Urbana-Champaign. However, development of that httpd had stalled after Rob left NCSA in mid-1994, and many webmasters had developed their own extensions and bug fixes that were in need of a common distribution. A small group of these webmasters, contacted via private e-mail, gathered together for the purpose of coordinating their changes (in the form of "patches"). BY: VIKRAM.G.B 3 Lecturer, P.G Dept of Commerce Vivekananda Degree College, Bangalore-55 Using NCSA httpd 1.3 as a base, the group added all of the published bug fixes and worthwhile enhancements we could find, tested the result on our own servers, and made the first official public release (0.6.2) of the Apache server in April 1995. There is a core group of contributors, formed initially of the project founders, and augmented from time to time by other outstanding contributors. There are 'committers', who are granted access to the source code control repositories to help maintain the project or docs, and the core group now managing the project, which is called the Apache HTTP Project Management Committee (PMC, for short). In fact, each Apache Software Foundation project has its own PMC, to determine committers, project direction and overall management.
Recommended publications
  • The Web ICT Systems for Business Networking Vito Morreale
    ICT Systems for Business Networking Vito Morreale The Web ICT Systems for Business Networking Vito Morreale Note. The content of this document is mainly drawn from Wikipedia [www.wikipedia.org] and follows GNU Free Documentation License (GFDL), the license through which Wikipedia's articles are made available. The GNU Free Documentation License (GFDL) permits the redistribution, creation of derivative works, and commercial use of content provided its authors are attributed and this content remains available under the GFDL. Material on Wikipedia (and this document too) may thus be distributed multilingually to, or incorporated from, resources which also use this license. Table of contents 1 INTRODUCTION ................................................................................................................................................ 3 2 HOW THE WEB WORKS .................................................................................................................................. 4 2.1 PUBLISHING WEB PAGES ....................................................................................................................................... 4 2.2 SOCIOLOGICAL IMPLICATIONS ................................................................................................................................ 5 3 UNIFORM RESOURCE IDENTIFIER (URI) ................................................................................................. 5 4 HYPERTEXT TRANSFER PROTOCOL (HTTP) ........................................................................................
    [Show full text]
  • A Measurement Study of the Wuala On-Line Storage Service
    A Measurement Study of the Wuala On-line Storage Service Thomas Mager, Ernst Biersack, and Pietro Michiardi EURECOM Sophia Antipolis, France fmager,erbi,[email protected] Abstract—Wuala is a popular online backup and file sharing • Understand if and how coding techniques are used to system that has been successfully operated for several years. assure the availability and durability of the data in case Very little is known about the design and implementation of of node failures Wuala. We capture the network traffic exchanged between the machines participating in Wuala to reverse engineer the design • Determine the transport protocol used to move data and operation of Wuala. When Wuala was launched, it used between peers and servers a clever combination of centralized storage in data centers for • Describe the evolution Wuala has undergone between long-term backup with peer-assisted file caching of frequently 2010 and 2012. downloaded files. Large files are broken up into transmission blocks and additional transmission blocks are generated using Our findings indicate that Wuala uses a simple, yet clever a classical redundancy coding scheme. Multiple transmission system design. Data availability – i.e., making sure that files blocks are sent in parallel to different machines and reliability is are accessible at any time – and durability – that is ensuring assured via a simple Automatic Repeat Request protocol on top of that files are never lost – are achieved by relying on servers UDP. Recently, however, Wuala has adopted a pure client/server based architecture. Our findings and the underlying reasons are located in a data center, instead of using peers.
    [Show full text]
  • Advanced Copyright Issues on the Internet
    ADVANCED COPYRIGHT ISSUES ON THE INTERNET * David L. Hayes, Esq. FENWICK & WEST LLP * Chairman of Intellectual Property Practice Group, Fenwick & West LLP, Mountain View & San Francisco, California. B.S.E.E. (Summa Cum Laude), Rice University (1978); M.S.E.E., Stanford University (1980); J.D. (Cum Laude), Harvard Law School (1984). An earlier version of this paper appeared in David L. Hayes, “Advanced Copyright Issues on the Internet,” 7 Tex. Intell. Prop. L.J. 1 (Fall 1998). The author expresses appreciation to Matthew Becker for significant contributions to Section III.E (“Streaming and Downloading”). © 1997-2013 David L. Hayes. All Rights Reserved. (Updated as of June 2013) TABLE OF CONTENTS I. INTRODUCTION 14 II. RIGHTS IMPLICATED BY TRANSMISSION AND USE OF WORKS ON THE INTERNET 15 A. The Right of Reproduction 15 1. The Ubiquitous Nature of “Copies” on the Internet 16 2. Whether Images of Data Stored in RAM Qualify as “Copies” 16 3. The WIPO Treaties & the European Copyright Directive Are Unclear With Respect to Interim “Copies” 23 (a) Introduction to the WIPO Treaties & the European Copyright Directive 23 (b) The WIPO Copyright Treaty 25 (c) The WIPO Performances and Phonograms Treaty 28 4. The Requirement of Volition for Direct Liability 30 (a) The Netcom Case 31 (b) The MAPHIA Case 33 (c) The Sabella Case 34 (d) The Frena Case 35 (e) The Webbworld Case 36 (f) The Sanfilippo Case 37 (g) The Free Republic Case 38 (h) The MP3.com Cases 40 (i) The CoStar Case 43 (j) The Ellison Case 44 (k) Perfect 10 v.
    [Show full text]
  • Your Church Website
    Your Church Website Lai Salmonson Webmaster, BSCNC Cary, NC 27511 [email protected] (800) 395-5102 ext. 5589 (919) 459-5589 Table of Contents: Websites 101 Website Design Tips Wix or WordPress Content Management Systems and Hosting Options Wix (Hosting and Domain) WordPress (DreamHost hosting and domain is Free) SiteGround (Host your website) Other Resources Online Giving Solutions Sign up for more classes at: www.ncbaptist.org/website ​ Note: Pricing and services change so please check with the links provided. 1 Websites 101 Q&A: 1. What is a website? a. A website is a set of related web pages served from a single web domain. A website is hosted on at least one web server, accessible via a network such as the Internet or a private local area network through an Internet address known as a Uniform Resource Locator (URL). All publicly accessible websites collectively constitute the World Wide Web. The World Wide Web (WWW) was created in 1990 by British CERN physicist, Tim Berners-Lee. On 30 April 1993, CERN (the European Organization for Nuclear Research) announced that the World Wide Web would be free to use for anyone. (https://en.wikipedia.org/wiki/Website) ​ ​ 2. How big is the World Wide Web? a. Current size:https://www.worldwidewebsize.com/ and ​ ​ http://www.internetlivestats.com/ 3. What is a web Content Management System (CMS)? a. A web content management system is a bundled or stand-alone application to create, manage, store and deploy content on Web pages. Web content includes text and embedded graphics, photos, video, audio, and code that displays content or interacts with the user.
    [Show full text]
  • Stealthwatch V7.0 Default Applications Definitions
    Cisco Stealthwatch Default Applications Definitions 7.0 Stealthwatch® v7.0 Default Applications Definitions Stealthwatch® v7.0 Default Applications Definitions The table in this document lists the default Stealthwatch applications defined on the Custom Applications page in the SMC Web App. The intended audience for this document includes users who want a clearer understanding of what com- prises a default application that Stealthwatch monitors. In the table below, the number in parentheses after the application name is a unique identifier (UID). Application Criteria Name Description Stealthwatch Classification Port/Protocol Registered with IANA on port 629 3com AMP3 3com AMP3 (719) TCP/UDP. Registered with IANA on port 106 3com TSMUX 3com TSMUX (720) TCP/UDP. The Application Configuration Access Pro- tocol (ACAP) is a protocol for storing and synchronizing general configuration and preference data. It was originally ACAP ACAP (722) developed so that IMAP clients can easily access address books, user options, and other data on a central server and be kept in sync across all clients. AccessBuilder (Access Builder) is a family AccessBuilder AccessBuilder (724) Copyright © 2018 Cisco Systems, Inc. All rights reserved. - 2 - Stealthwatch® v7.0 Default Applications Definitions Application Criteria Name Description Stealthwatch Classification Port/Protocol of dial-in remote access servers that give mobile computer users and remote office workers full access to workgroup, depart- mental, and enterprise network resources. Remote users dial into AccessBuilder via analog or digital connections to get direct, transparent links to Ethernet and Token Ring LANs-just as if they were connected locally. AccessBuilder products support a broad range of computing platforms, net- work operating systems, and protocols to fit a variety of network environments.
    [Show full text]
  • Ifta's Copyright Guide
    IFTA® Practical Guide to Copyright Protection Contents A Road Map to Protect Your Works and Enforce Your Rights / 1 Checklist for Copyright Protection and Security at Critical Points of Vulnerability / 12 International and National Legal Frameworks for Copyright Protection and Enforcement / 19 Steps for Notifying ISPs, Payment Processors, Search Engines, and Advertisers of Copyright Infringement / 25 Drafting Distribution Agreements to Maximize Copyright Protection / 30 Glossary of Terminology / 34 Please contact the IFTA Legal Department for more information on any matters in this Guide. Your feedback, experiences and input are welcome in developing Member services that matter most to your business. IFTA Legal Department Susan Cleary, Vice President and General Counsel [email protected] Eric Cady, Senior Counsel [email protected] Orson Rheinfurth, Counsel & Director, IFTA Collections [email protected] Marisol Figueroa, Administrative Assistant, Legal & Collections [email protected] © 2015 IFTA. All Rights Reserved. A Road Map to Protect Your Works and Enforce Your Rights New digital platforms and distribution technology create opportunities for the independent film and television industry. Yet those same technologies also dramatically expand the ease with which a single act of infringement can rapidly spread worldwide across multiple mediums and decisively undermine revenue expectations and future financing options. The risk of theft arises well before a film or program is ready for release and should be addressed prior to production. The stakes are too high to leave to chance. Protecting the security of assets must be the responsibility of everyone in your company and of all those who touch the film or program from beginning to the end of its distribution cycle.
    [Show full text]
  • Unit 4 Web Hosting
    Programming for the Web Unit 4 Web Hosting What is Web Hosting? Web hosting is a service that allows organizations and individuals to post a website or web page onto the Internet. Web hosting is a necessity for any website — it is the physical location of your website on the Internet, an online storage center that houses the information, images, video, and other content that comprises your website. A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their website accessible via the World Wide Web. Web hosts are companies that provide space on a server owned or leased for use by clients, as well as providing Internet connectivity, typically in a data center. Web hosting is the place where all the files of your website live. It is like the home of your website where it actually lives. Unit 4-Web Hosting Page 1 Programming for the Web In a nutshell, web hosting is the process of renting or buying space to house a website on the World Wide Web. Website content such as HTML, CSS, and images has to be housed on a server to be viewable online. When a hosting provider allocates space on a web server for a website to store its files, they are hosting a website. Web hosting makes the files that comprise a website (code, images, etc.) available for viewing online. Every website you’ve ever visited is hosted on a server. What exactly is a server? A server is a computer that connects other web users to your site from anywhere in the world.
    [Show full text]
  • Terms & Conditions
    Terms & Conditions BETWEEN: The Client, Hereafter called the “User”, AND: HostDZire Web Services Pvt. Ltd Reachable via its Internet site http//www.hostdzire.com/ Article 1. DEFINITIONS Supplier: We”, “Us”, “HostDZire”, “HostDZire Web Services Pvt. Ltd.”, “Our” and / or “HostDZire Web Services Private Limited” is the hosting service provider and maybe called by any one of these names. HostDZire Web Services Private Limited is a registered company in India. CIN: U72300BR2015PTC024063 Customer: “You”, “Your”, “Client”, “Customer” and / or “Member” is the person or person’s representative who purchases hosting service(s) from HostDZire Web Services Private Limited. Agreement: The Agreement comprises these Terms And Conditions and/or each Order Including Account Opening Form, HostDZire Policies and all other schedules there to, pursuant to which HostDZire shall provide certain (internet) services to Customer, which Services are indicated on the Order Form(s) or the Order Confirmation which form an integral part of the Agreement; the entire set is hereafter called the “Agreement”. Site Or Internet Website: www.hostdzire.com providing access to the Account Management Console in particular. Server: A computer dedicated to the User and used by the latter once it is made available and that is permanently connected to the Internet via a high-speed connection. Dedicated Servers: A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone else. Web Hosting: A web host, or web hosting service, that provides the technologies and services needed for the website or webpage to be viewed in the Internet.
    [Show full text]
  • A Cloud Architecture for Reducing Costs in Local Parallel And
    A CLOUD ARCHITECTURE FOR REDUCING COSTS IN LOCAL PARALLEL AND DISTRIBUTED VIRTUALIZED CLOUD ENVIRONMENTS by JEFFREY MICHAEL GALLOWAY Dr. SUSAN VRBSKY, COMMITTEE CHAIR Dr. XIAOYAN HONG Dr. JOHN LUSTH Dr. RANDY SMITH Dr. FEI HU A DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of The University of Alabama TUSCALOOSA, ALABAMA 2013 Copyright Jeffrey Michael Galloway 2013 ALL RIGHTS RESERVED ABSTRACT Deploying local cloud architectures can be beneficial to organizations that wish to maxi- mize their available computational and storage resources. Many users are reluctant to move their computational and storage needs to a public cloud vendor. While designing scalable local cloud architectures, power requirements should be given adamant attention. This dissertation focuses on several challenging concerns relating to cloud computing architectures, specifically lowering the power requirements of Infrastructure-as-a-Service (IaaS) local cloud architectures. These chal- lenges include power efficient computational resource load consolidating, power efficient persis- tent cloud storage consolidating, and deploying a local IaaS cloud architecture with limited net- working resources. The design of a load consolidation approach to Infrastructure-as-a-Service cloud archi- tectures that is power efficient is presented in this dissertation. A proposed Power Aware Load Consolidation algorithm, PALC, maintains the state of all compute nodes, and based on utiliza- tion percentages, decides the number of compute nodes that should be operating. Results show that PALC provides adequate availability to compute node resources while decreasing the overall power consumed by the local cloud architecture. Persistent storage is a necessity in cloud computing architectures.
    [Show full text]
  • F a FILE SHARING SERVICE for UNIVERSITIES BASED on CLOUD COMPUTING
    INTRODUCTON f A FILE SHARING SERVICE FOR UNIVERSITIES BASED ON CLOUD COMPUTING BY ALNTHEER MUHAMMED HASSAN ELSANOUSI INDEX NO. 084021 Supervisor DR/Muhammad Alkarouri REPORT SUPMITTED TO University Of Khartoum In partial fulfillment of the requirement for the degree B.Sc. (HONS) Electrical and Electronic Engineering (ELECTRONIC SYSTEMS SOFTWARE ENGINEERING) Faculty of Engineering Department of Electrical and Electronic Engineering July 2013 1 DECLARATION OF ORIGINALITY I declare that this report entitled “a file sharing service for universities based on Cloud computing ” is my own work except as cited in the references. The report has not been accepted for any degree and is not being submitted concurrently in candidature for any degree or other award. Signature: _________________________ Name: _________________________ Date: _________________________ DEDICATION ii To my portents, To my siblings, To my teachers’ To my friends and colleagues, To those who guided me throughout my journey and supported me all through the way. iii ACKNOWLEDGMENTS All praise and thanks is due to almighty God. I wish to thank him for all that he has gifted us with, though he can never be praised or thanked enough. I would like to give my deepest gratitude to our supervisor DR/Muhammad Alkarouri who offered valuable comments and advices throughout the condition of this project. Special thanks to the young engineers at the University of Khartoum and to my partners Awab Ahmed Almisbah and Omer khogli Imam for their cooperation and kind sharing to their efforts, time and knowledge. I would like to express my love and gratitude to my family; for their understanding and un-conditioning love and support during my life.
    [Show full text]
  • Stealthwatch V6.9.0 Default Applications Definitions
    TABLE | Stealthwatch v6.9 Default Applications Definitions STEALTHWATCH® V6.9 DEFAULT APPLICATIONS DEFINITIONS Stealthwatch (SMC) v6.9 Default Applications Definitions The table in this document lists the default Stealthwatch applications defined on the Custom Applications page in the SMC Web Application (App) interface. Audience The intended audience for this document includes users who want a clearer understanding of what comprises a default application that Stealthwatch monitors. Note: In the table below, the number in parentheses after the application name is a unique identifier (UID). Name Application Criteria Description Stealthwatch Port/ IP Range Classification Protocol 3com AMP3 3com AMP3 (719) Registered with IANA on port 629 TCP/UDP. 3com TSMUX 3com TSMUX (720) Registered with IANA on port 106 TCP/UDP. ACAP ACAP (722) The Application Configuration Access Protocol (ACAP) is a protocol for storing and synchronizing general configuration and preference data. It was originally developed so that IMAP clients can easily access address books, user options, and other data on a central server and be kept in sync across all clients. 1 TABLE | Stealthwatch v6.9 Default Applications Definitions Name Application Criteria Description Stealthwatch Port/ IP Range Classification Protocol AccessBuilder AccessBuilder (724) AccessBuilder (Access Builder) is a family of dial-in remote access servers that give mobile computer users and remote office workers full access to workgroup, departmental, and enterprise network resources. Remote users dial into AccessBuilder via analog or digital connections to get direct, transparent links to Ethernet and Token Ring LANs-just as if they were connected locally. AccessBuilder products support a broad range of computing platforms, network operating systems, and protocols to fit a variety of network environments.
    [Show full text]
  • Cloud Computing: VM Placement & Load Balancing
    www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 11 November, 2014 Page No. 9197-9200 Cloud Computing: VM placement & Load Balancing Adeel Hashmi Maharaja Surajmal Institute of Technology, Department of Computer Science Janakpuri, New Delhi, India [email protected] Abstract: In recent years, cloud computing has become a popular paradigm for hosting and delivering services over the internet. The key technology that makes cloud computing possible is server virtualization, which enables dynamic sharing of physical resources. Through virtualization, a cloud service provider can ensure QoS delivered to the user while achieving higher server utilization and energy efficiency. Virtualization introduces the problem of virtual machine placement and also increases the overheads in load balancing. This paper discusses the various the various algorithms dealing with VM placement and load balancing in cloud environment. Keywords: Cloud computing, Virtualization, Virtual Machines, Load balancing. 1. Introduction Infrastructure-as-a-Service provides the customer with storage and virtual server instances, as well as APIs that allow the customer to configure their virtual servers and Clusters [1] are distributed systems under the supervision of storage. This model allows the organization to pay for only single administrative domain. Grid [1] is a geographically as much capacity as is needed, and scale up/down as soon as dispersed collection of distributed systems. Cloud is a required. Popular example is Google Drive, Amazon EC2 collection of parallel and distributed system where the nodes (Elastic Compute Cloud). are virtualized whereby a single physical server can run multiple virtual servers, thus reducing the resources as well All the given examples i.e.
    [Show full text]