UNIT-I Cloud Computing definition private, public and hybrid cloud Cloud types; IaaS, PaaS, SaaS. Benefits and challenges of cloud computing, Public vs Private clouds, Role of virtualization in enabling the cloud; Business Agility: Benefits and challenges to Cloud architecture
9/17/2014 J.Jeysree 2 Sub waves in information age
9/17/2014 J.Jeysree 3 CSP Extension to ISP ISP 1.0-access to internet for organizations and individuals ISP 2.0-access to email and servers ISP 3.0-host organizations servers along with infrastructure and application ISP 4.0(ASP)-provides specialized applications not only infrastructure ISP 5.0(CSP)-Iaas,Saas,PaaS 9/17/2014 J.Jeysree 4 Evolution of cloud computing 9/17/2014 J.Jeysree 5 6 Networks Multiple regional networks linking computers Initially at universities and national labs Inter-Networking and the Internet Inter-Networking of regional networks with TCP/IP Began to replace regional alternatives Worldwide adoption file transfer remote resources and collaboration Mainly used for highly scalable HPC jobs The World Wide Web HTML page format, HTTP protocol, and Mosaic browser for document exchange Initially in universities; worldwide adoption Network Sharing Information Sharing Grid Computing Standards and software for sharing of Resource Sharing Networking Cloud Computing Everything as a service over the Web: SaaS, utility computing, IT services, everywhere, always available, scalable, Services Sharing Evolution of Sharing on the Internet 7 Five characteristics of cloud computing Attributes Multitenancy-Unlike other computing,resources shared at network,host and application level Massive scalability-ability to scale bandwidth and storage space Elasticity-increase/decrease as needed,release when no longer needed Pay as you go-pay for usage Self provisioning of additional systems(processing capability, software,storage) and network resources
9/17/2014 J.Jeysree 8 Attribute of elasticity 9/17/2014 J.Jeysree 9 9/17/2014 J.Jeysree 10 11 Architecture Relevant Technologies 9/17/2014 J.Jeysree 12 Technologies 1. Cloud access devices HomePCs,enterprise PCs, network computers, mobile phones, handheld, static devices(all are online) Skype ,SalesForce application through iPhone 2. Browsers and thin clients Access application and information from anywhere Interface for Enterprise Application(SAP and Oracle) 3. High speed broadband access 4. Datacenters and server farms Large computing capacity are hosted Span across multiple location and interconnected Google(inexpensive servers for flexibility and power),amazon EC2(virtualization),SalesForce Saas(clustered customers for scalability and flexibility) 5. Storage devices 1. Decreased cost with flexiblity replace DASD with SAN 2. Suitable enterprise storage 3. Independent allocation of storage on demand across no of devices 9/17/2014 J.Jeysree 13 9/17/2014 J.Jeysree 14 6.Virtualization Foundational Technology Abstraction of compute resources(CPU, storage,network,memory,application stack, and database) from end users and application Scalable, shared resource platform for all users-mutitenancy business model Provide dedicated source view for customers Various forms OS (VMWare,Xen) Storage(NAS,SAN) Databsae Software(Apache Tomcat,Jboss,Oracle,AppServer,WebSphere)
Key Technology- Virtualization 9/17/2014 J.Jeysree 15 Hardware Operating System App App App Traditional Stack Hardware OS App App App Hypervisor OS OS Virtualized Stack Sun xVM hypervisor environment 9/17/2014 J.Jeysree 16 9/17/2014 J.Jeysree 17 7.API Enables self provisioning and programmatic control of cloud services and resources Depending on SPI,range from basic URL to SOA programs Mask the complexity involved in cloud Use Http,get,post,put delete Each CSP has a unique API Challenge:ubiquitious and consistent API(easy interoperability but difficult to achieve) API enabler for cloud computing 9/17/2014 J.Jeysree 18 SPI Framework 9/17/2014 J.Jeysree 19 Services Delivery Model 9/17/2014 J.Jeysree 20 Software as a service No CapEx,only OpEx(rent and pay) Benefits Outsource hosting and management application Controls and limits use Prohibits copy and distribute No special hardware ,use existing internet infrastructure Different from ASP Isolated,single-tenant model,not net-native application,poor performance Challenge:secure differentiation of data
9/17/2014 J.Jeysree 21 Platform as a service Offers development environment to application developers Charge for platform, sales and distribution service no need for specialized administration skills, direct deployment Useful for web application Elements Browser based Provide IDE for target delivery platform(debugging and test) Integration with external web services and databases
9/17/2014 J.Jeysree 22 Infrastructure as a service Entire infrastructure for running application Utility computing Abstract user from infrastructure(computing resources, location, data partitioning, scaling, etc.,) Features Scalability Pay as you go Best-of-breed technology 9/17/2014 J.Jeysree 23 9/17/2014 J.Jeysree 24 Scalability, reliability, and security with no development or configuration cost Support for formal and on-demand collaboration through lifecycle Pay-as-you-go metered billing Difference Multitenant development tool-multiple user with multiple active project Multitenant deployment architecture-built-in scalability Integrated management-runtime monitoring Integrated billing-pay for usage
Deployment model Based on relationship to enterprise Public(external) Private(internal) hybrid 9/17/2014 J.Jeysree 25 Public cloud Hosted, operated and managed by third party vendor Services offered over a common infrastructure Third party vendors take care of Security and data-to-day operation
9/17/2014 J.Jeysree 26 Private cloud Cloud computing on private network provides hosted services to a limited number of people behind a firewall. Dedicated to single organization Organizational customer is responsible for cloud operation
9/17/2014 J.Jeysree 27 Types Dedicated Community managed location Own data center Third party Own datacenter Operation and management Internal IT department Vendors bounded by SLAs vendor owner customer Vendors bounded by SLAs
customer Hybrid Internal and/or external providers non-core application public cloud Core and sensitive application in private cloud 9/17/2014 J.Jeysree 28 Difference 9/17/2014 J.Jeysree 29 CSPs 9/17/2014 J.Jeysree 30 Benefits Dedicated/Traditional IT Cloud Computing High upfront IT investments for new builds Low IT investments; pay-for-use model High cost of reliable infrastructure Reliability built into the cloud architecture High complexity of IT environment Modular IT architecture environment Complex infrastructure No infrastructure 9/17/2014 J.Jeysree 31 Key drivers Small initial investment and low ongoing cost avoid capital Expenditure No purchase of h/w,s/w,network devices Usage based billing Economies of scale Difficult to make accurate estimates because of sizing in life cycle In cloud, acquire resources as needed Low risk of missing deadline Open Standards based on open standards Flexible to alter the source code Sustainability Stable environment Limited points of failure
9/17/2014 J.Jeysree 32 Impact of cloud Impact of cloud on different type of users Individual consumers Rely for storage and computing resources Tremendous amount of data is available Stores personal email Store photos Buy music Find driving and walking directions Develop webs Individual business Many free software, pay only for additional services/extra capacity Host website 9/17/2014 J.Jeysree 33 9/17/2014 J.Jeysree 34 Use ebay to sell and market individual items Place ads with search engine providers Engage with on line banks Use office assistants to arrange appointment Start-ups Small and Medium-size business Based on complexity Less diverse in skills Enterprise business Low level-access services beyond firewall High level-use knowledge tool to support personal productivity Mature level-use in business critical applicatio n
Governance in the cloud 9/17/2014 J.Jeysree 35 Barriers Security & Privacy Interoperability Connectivity and performance Reliability Platform or language specificity 9/17/2014 J.Jeysree 36 Reference
Cloud Security and privacy by Tim Mather,Subra Kumaraswamy,Shahed latif,Chapter 1,2 9/17/2014 J.Jeysree 37