You are on page 1of 8

M.I.S.

Assignment on RFID in CLOUD COMPUTING

Submitted by:Tarun Talwar (50) Zoha Raza (51) Kumar Anand (23) Devesh Singh (54) Abhishek Kumar (52)

Cloud Computing
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Cloud computing entrusts, typically centralized, services with your data, software, and computation on a published Application Programming Interface (API) over a network. It has a lot of overlap with Software As A Service (SaaS). End users access cloud based applications through a web browser or a light weight desktop or mobile app while the business software and data are stored on servers at a remote location. Cloud application providers strive to give the same or better service and performance than if the software programs were installed locally on end-user computers. At the foundation of cloud computing is the broader concept of infrastructure convergence (or Converged Infrastructure) and shared services. This type of data centre environment allows enterprises to get their applications up and running faster, with easier manageability and less maintenance, and enables IT to more rapidly adjust IT resources (such as servers, storage, and networking) to meet fluctuating and unpredictable business demand.

Cloud computing providers offer their services according to three fundamental models:
Infrastructure As A Service (IAAS), Platform As A Service (PAAS), Software As A Service (SAAS)

where IAAS is the most basic and each higher model abstracts from the details of the lower models.

Infrastructure As A Service (IAAS) In this most basic cloud service model, cloud providers offer computers as physical or more often as virtual machines , raw (block) storage, firewalls, load balancers, and networks. IaaS providers supply these resources on demand from their large pools installed in data centers. Local area networks including IP addresses are part of the offer. For the wide area connectivity, the Internet can be used or - in carrier clouds - dedicated virtual private networks can be configured. To deploy their applications, cloud users then install operating system images on the machines as well as their application software. In this model, it is the cloud user who is responsible for patching and maintaining the operating systems and application software. Cloud providers typically bill IAAS services on a utility computing basis, that is, cost will reflect the amount of resources allocated and consumed. Platform As A Service (PAAS) In the PAAS model, cloud providers deliver a computing platform and/or solution stack typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PAAS offers, the underlying compute and storage resources scale automatically to match application demand such that the cloud user does not have to allocate resources manually. Software As A Service (SAAS) In this model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. The cloud users do not manage the cloud infrastructure and platform on which the application is running. This eliminates the need to install and run the application on the cloud user's own computers simplifying maintenance and support. What makes a cloud application different from other applications is its elasticity. This

can be achieved by cloning tasks onto multiple virtual machines at run-time to meet the changing work demand. Load balancers distribute the work over the set of virtual machines. This process is transparent to the cloud user who sees only a single access point. To accommodate a large number of cloud users, cloud applications can be multitenant, that is, any machine serves more than one cloud user organization. It is common to refer to special types of cloud based application software with a similar naming convention: desktop as a service, business process as a service, Test Environment as a Service, communication as a service. The pricing model for SAAS applications is typically a monthly or yearly flat fee per user.

Cloud Clients
Users access cloud computing using networked client devices, such as desktop computers, laptops, tablets and smart phones. Some of these devices - cloud clients - rely on cloud computing for all or a majority of their applications so as to be essentially useless without it. Examples are thin clients and the browser-based Chrome book. Many cloud applications do not require specific software on the client and instead use a web browser to interact with the cloud application. With Ajax and HTML5 these Web user interfaces can achieve a similar or even better look and feel as native applications. Some cloud applications, however, support specific client software dedicated to these applications (e.g., virtual desktop clients and most email clients). Some legacy applications (line of business applications that until now have been prevalent in thin client Windows computing) are delivered via a screen-sharing technology. Deployment models

Cloud Computing Types


Public Cloud Applications, storage, and other resources are made available to the general public by a service provider. Public cloud services may be free or offered on a pay-per-usage model. There are limited service providers like Microsoft, Google etc owns all Infrastructure at their Data Centre and the access will be through Internet mode only. No direct connectivity proposed in Public Cloud Architecture. Community Cloud Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the cost savings potential of cloud computing are realized. Hybrid Cloud Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. Private Cloud Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. They have attracted criticism because users "still have to buy, build, and manage them" and thus do not benefit from less hands-on management, essentially "[lacking] the economic model that makes cloud computing such an intriguing concept"

RFID (Radio Frequency Identification)


RFID (Radio Frequency Identification) is a technology which has been around since early 1900s. It has grown over the years from then. As per the currents scenario, RFID technology is seen heavily influencing our daily lifestyles to an extent that it is woven into our clothes and it has penetrated into our skin. When it comes to tracking objects, RFID has become the prime choice. Fully automated homes are no more a dream. What makes this technology so important would be appreciated by looking at the numerous bonuses it offers over the other existing identification technologies in the market. But even the roses are with thorns and so is the case with this technology. Before actually coming to the issues faced by the technology and the mechanism applied to the issues faced, a brief understanding of the technologies themselves becomes mandatory and the same has been presented in the subsequent paragraphs. RFID and CLOUD COMPUTING

Many times we think about RFID as the technology itself and not about the true product it produces. Not surprising from a sales role, as getting the right equipment into someones hands is one of the first key steps. But almost as soon as we start to clear that first hurdle of finding the right product to fit the application. A Cloud Site can be simply thought of as a server farm not owned or maintained by you. In fact, many times you are simply leasing space on secure servers with others like many do today to host a website for example. This can greatly reduce your start-up costs as well as the drain that can be put on your IT staff. The idea of Cloud Computing is that you can send and access the data from anywhere with basically any method at your disposal with the limits you wish to impose. For example, security of this data can be as tight or a loose as you choose and access can be granted as needed. For example, imagine being able to have a sales person bring up the amount of consumables and statistics about their machines right in front of the customer using his smart phone. For the second example, you could have a secure website a distributor or service person could bring up using a field hand-held device showing any data needed for the products they sell or service. Cloud Computing provides a means by which to collect and use the data from many different data rich scenarios. And most importantly, removes a technology and cost barrier many think exist or can only be overcome by big resource rich corporations when it comes to hardware and know-how. RFID is still in its growth phase and is being adopted by a huge number of organizations. Expanded deployments of RFID systems in big organizations are taking place as a result of adoption of the RFID technology. As a result, more infrastructure, cost, services, applications are required. The problem of scalability is even more intense in such a situation. All the scenarios point towards one common concern in RFID systems and that is the scalability. For an RFID to perform more computations, efficiently deal with more data or to be widely adopted, it becomes quite important to design ideas leading to the futuristic scalable RFID systems. In the context of RFID technology, when a single reader is able to identify large number of tags and is very well able to communicate with them, it may be referred as a scalable RFID system. But this often does not happen in the real time scenario due to various practical constraints like collisions during the communication that takes place between the tags and the reader, lack of computational power of RFID tags, bulk of data generated by RFID systems. The above discussed scenarios support this view even more strongly keeping in view the futuristic RFID systems. In other words, there is an alarming need to revive the existing architecture of the existing RFID systems in a way that the new architecture is capable of surviving scalability.

The main focus is to attach a mechanism called cloud computing to the existing RFID technology and thereby to propose a framework of the architecture for the same. This would

further show a way to the futuristic scalable RFID systems. The figure represents the proposed cloud computing architecture for scalable RFID.

The Front End: The front end part of the proposed architecture is composed up of the networked RFID Tags and Readers, computers with RFID data storage and processing capabilities (limited) and lastly applications which provide access to the cloud computing system. The working of the front end starts up with the initial generation of RFID data as a result of communication between the RFID tags and the RFID reader over the network. This data is generated as and when an RFID tag appears in the interrogation zone of the RFID reader. It is assumed here that the RFID system under consideration is the futuristic RFID system which is generating even more data than the existing RFID systems as a result of reduced number of collisions, enhanced computational capabilities and expanded infrastructure with even wider adoption of the technology. The data captured by the RFID reader is now sent to the data processing system composed of user interface and specific application to access the back end of the architecture. Now this huge data generated by this RFID system would be filtered, stored, semantically inferred before its actual usage. Now for all these purposes a cloud computing back end would be used which is connected to the front end via a network. The RFID data would actually be fed as an input to the back end of This proposed cloud computing architecture for scalable RFID in order to enhance the use of RFID data generated for greater purposes. The Back End:

The back end of the proposed architecture is composed up of infrastructure (computers, data storage systems etc.), applications, services and servers. Here, on the cloud, the RFID data is semantically filtered according to a specific application of need, use its relative platform and infrastructure over the network and then stored on a specific server. Middleware and protocols are used in the cloud computing system here. A server administers the system and traffic. The middleware and protocols allow the networked resources to communicate to each other. Here, in the proposed architecture, the cloud computing systems need a lot of storage space which it requires to keep all its RFID systems clients' information stored. It makes a copy of all the RFID information and stores it. The copies enable the central server to access backup machines to retrieve data that otherwise would be unreachable. Now as a result of using cloud computing, the huge amount of data which was lost earlier at very early stages as a result of lack of storage and because of bearing low priority in the semantic inference may now be preserved and processed on the cloud to draw more intense conclusions. Moreover, it motivates more efficient utilization of the existing resources rather than demanding a need to incorporate new infrastructure and services.

You might also like