Thursday, 9 June 2022

IaaS, PaaS, SaaS, and On-Premises – all you need to know!

Or, IaaS, PaaS, SaaS, and On-Premises - explained with examples, usage scenario, and consumer details

Or, what are the various differences between On-Premises, IaaS, PaaS, and SaaS?

Or, what are the definitions of parameters used in the shared responsibility model in the cloud?

Or, Explain IaaS, PaaS, SaaS, and On-Premises models with Examples, Target Consumers, and Usage & Purposes.


Descriptions: In this article we will be learning about differences, use cases, responsibilities, and various others about the different cloud models offerings (e.g. IaaS, SaaS, PaaS), including the bonus learning about understanding how On-Premises infrastructure is different than these cloud offerings.

 

Lets begin with the full forms (as given below):

IaaS: Infrastructure as a Services

PaaS: Platform as a Service

SaaS: Software as a Service


Comparison based on responsibilities (Shared Responsibility Model)


 

Brief about the parameters used in the comparison table:

Applications: Applications are used by end users. An application can be simply a web browser, a media player, or a program designed to perform some specific tasks.

Data: Data is collection of information in the form of files, media, software etc. The most common data used by users are in the form of pdf files, documents files, images, videos etc…

Runtime: When a program is in running or executing state, this state of the computer is known as Runtime. When you open or execute a program, the Runtime starts, and when you close the program, the Runtime ends.

Middleware: A middleware is software which exists between an operating system and the application running on the operating system. All the middleware software performs communication functions between operating systems and applications running on it.

Database middleware, applications middleware, web-based middleware, and message-based middleware are some most commonly knows middleware software.

OS (Operating Systems): An operating system is system software that manages the computer’s hardware (e.g. CPU, Input/Output Devices, Memory, Ethernets etc…). Most commonly knows operating systems are, Windows, Linux, and Mac.

Virtualization: One of the most commonly used technology now a days which is playing a vital role in cloud computing environment too. Virtualization usage software to simulate the functionalities of hardware which helps running multiple type of operating systems virtually on the single hypervisor operating systems.

Most commonly used virtualization platforms/technologies are VMware vSphere, Microsoft Hyper-V, and Citrix Hypervisors.

Virtualization is not limited to just hardware as it also support many verities of applications virtualizations.

Servers: A server is combination of computer hardware and software that provides accessibility of services, over the network connection with the help of applications or in-build roles, to the end users. Most commonly servers are database servers, file servers, front-end servers, web servers etc…

Storage: Almost all the applications produces data that is processed when needed, and stored for further reference and processing. The storage systems are capable of storing any type of data in various forms such as simple block storage, SAN, NAS, Files, Disks, Database tables etc..

Networking: Networking is one of the most critical pillar of cloud or on-premises infrastructure. Without networking, we can’t imagine this whole system to work collaboratively by being tightly integrated with each other. Networking helps two or more applications or servers to talk to each other and share the information or data to serve the users requests.

 

Examples, Target Consumers, and Use Cases / Purposes:


Cheers! Write me back if you have queries or feedback!

Friday, 3 June 2022

Difference between AWS Security Groups and NACLs

What are the differences between AWS Security Group and NACLs (Network Access Control List)?

Security Group NACL

Security Groups: A security group in AWS act as a virtual firewall which controls the traffic that is allowed to reach or leave the associated resources.

The main characteristics of a security group are as listed below:

1. Security group operates at the instance level

2. This is stateful: return traffic is automatically allowed, once the incoming traffic is already trusted

3. All rules are evaluated every time before deciding whether to allow the traffic

4. It supports allow rules only

5. Applies to an EC2 instance, only when someone do it manually

 

NACL (Network Access Control List): A network access control list (NACL) in AWS act as an additional layer of security that controls traffic (in and out) at VPC level for one or more subnets associated with the respective VPC (Virtual Private Cloud).

The main characteristics of a NACL are as listed below:

1. NACL operates at the subnet level

2. This is stateless: return traffic must be explicitly allowed by rules else the return traffic will be denied

3. Rules are evaluated in order (lowest to highest) when deciding whether to allow traffic, the lowest number has the highest priority

4. It supports both allow and deny rules

5. It applies automatically to all EC2 instances in the subnet associated with the respective VPC

 

Cheers! Write me back if you have any queries or feedback.