Category: 1x1 of IT

Cloud computing technology and online data storage in innovative perception

Cloud infrastructure

Cloud services are being used more and more frequently and intensively. It is important to know what a cloud is and how a cloud is structured.

Cloud infrastructure

How this infrastructure is structured

In short, the infrastructures create multiple external storage locations. A cloud infrastructure essentially consists of four different components. These include the hardware, virtualization, storage and the network.

Hardware is the physical elements of a cloud infrastructure. These include, for example, servers, routers, switches and much more. These can be in different locations.

Virtualization then connects the servers with each other. The software, which is located on the physical hardware, centralizes the computer's resources in so-called pools.

The data is then stored in storage rows on the numerous disks in a data center. Software is used to create a new backup and the outdated backup is removed. This ensures that data is retained in the event of a power failure, for example.

The last component of the cloud infrastructure is divided into physical and virtual networks. The physical part includes cables, switches and other devices. The virtual networks are built on the basis of the physical networks.

Cloud computing

The cloud infrastructure is the prerequisite for cloud computing. It provides IT resources via the internet. In addition, there are various models, which are explained in detail here. As this model can be described as an external location, the payload that was previously uploaded can be accessed by the user at any time.

Clouds are being used more and more frequently because they are very flexible and offer a large amount of storage space. However, cloud services are also a popular target for hacker attacks due to the amount of data they contain. Furthermore, the various cloud platforms are very questionable in terms of data protection. At b.r.m., our customers' data is optimally secured with the help of our GDPR and Green IT-certified data center. We also have a data protection officer who will be happy to answer any questions you may have.

Man touching a data connection concept

MTOM and payload - from an IT perspective

Standard techniques have been introduced to exchange binary data. However, these payloads can also cause damage.

MTOM and payload

MTOM

The Message Transmission Optimization Mechanism (MTOM) transfers executable files (binary data) to the web services. XML binary Optimized Packaging (XOP) is then used for the transmission. The XOP technique is a more efficient mapping of structured data with specific content types.

This mechanism is recommended by the World Wide Web Consortium (W3C), the member organization for the standardization of technologies on the Internet.

Payload - two different sides

The term payload can have two different meanings. On the one hand, payload is the term for the components of malicious software (malware) that is smuggled into a system undetected. The malware is hidden with the help of the payload in an area of a message marked as text.

On the other hand, the term payload also exists in the field of communication technology. This refers to the transport of data in a data packet that does not contain any control or protocol information. Payload data includes, for example, texts, characters and images.

Transport of user data

The transport can vary depending on the protocol. As a rule, payload data is handled as follows for nested protocols. Payloads receive header information from the protocol when the protocol is executed. These are then forwarded to the underlying protocol layer and in turn represent user data. This process is repeated several times. The user data field usually follows the header, but a trailer can also follow a network protocol.

Further technical terms from the field of IT can be found in our 1×1 of IT.