SlideShare uma empresa Scribd logo
1 de 20
Cloud Models and Platforms
A Working Definition of Cloud Computing
 Cloud computing is a model for enabling convenient, on-demand network access to a shared
pool of configurable computing resources (e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with minimal management effort or
service provider interaction.
 This cloud model promotes availability and is composed of five essential characteristics,
three service models, and four deployment models.
.
Objectives of Cloud Computing
 Elasticity: Ability to scale virtual machines resources up or down
 On-demand usage: Ability to add or delete computing power (CPU,
memory), and storage according to demand
 Pay-per-use: Pay only for what you use
 Multitenancy: Ability to have multiplecustomers access their servers in the
data center in an isolated manner
.
5 Essential Cloud Characteristics
 On-demand self-service
 Broad network access
 Resource pooling
 Location independence
 Rapid elasticity
 Measured service
.
3 Cloud Service Models
 Cloud Software as a Service (SaaS)
 The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure and
accessible from various client devices through a thin client interface such as a Web browser (e.g., web-based email). The
consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, storage,
or even individual application capabilities, with the possible exception of limited user-specific application configuration
settings.
 Cloud Platform as a Service (PaaS)
 The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created
applications using programming languages and tools supported by the provider (e.g., Java, Python, .Net). The
consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, or
storage, but the consumer has control over the deployed applications and possibly application hosting environment
configurations.
 Cloud Infrastructure as a Service (IaaS)
 The capability provided to the consumer is to rent processing, storage, networks, and other fundamental
computing resources where the consumer is able to deploy and run arbitrary software, which can include operating
systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control
over operating systems, storage, deployed applications, and possibly select networking components (e.g., firewalls, load
balancers).
 To be considered “cloud” they must be deployed on top of cloud infrastructure that has the key characteristics
.
Service Model Architectures
.
Saas, PaaS, IaaS
.
3 Features of Mature SaaS Applications
 SaaS is hosting applications on the Internet as a service (both consumer and enterprise)
 Features of Mature Saas applications:
 Scalable
 Handle growing amounts of work in a graceful manner
 Multi-tenancy
 One application instance may be serving hundreds of companies
 Opposite of multi-instance where each customer is provisioned their own
server running one instance
 Metadata driven configurability
 Instead of customizing the application for a customer (requiring code
changes), one allows the user to configure the application through metadata
.
SaaS Maturity Levels
 Level 1: Ad-Hoc/Custom
 Level 2: Configurable
 Level 3: Configurable,
Multi-Tenant-Efficient
 Level 4: Scalable,
Configurable,
Multi-Tenant-Efficient
Source: Microsoft MSDN Architecture Center
.
3 Cloud Deployment Models Private cloud
 The cloud infrastructure is operated solely for an organization. It may be
managed by the organization or a third party and may exist on premise or off
premise.
 Public cloud
 Mega-scale cloud infrastructure is made available to the general public or a
large industry group and is owned by an organization selling cloud services.
 Hybrid cloud
 The cloud infrastructure is a composition of two or more clouds (private or
public) that remain unique entities but are bound together by standardized or
proprietary technology that enables data and application portability
.
Common Cloud Characteristics
 Cloud computing often leverages:
 Massive scale
 Homogeneity
 Virtualization
 Low cost software
 Geographic distribution
 Advanced security technologies
.
Security is the Major Issue
 Cloud computing often leverages:
 Massive scale
 Homogeneity
 Virtualization
 Low cost software
 Geographic distribution
 Advanced security technologies
.
Top Motivators for Adopting Cloud Computing
Source: IBM Tech Trends Report 2011
.
Cloud Security Advantages
 Shifting public data to a external cloud reduces the exposure of the internal sensitive
data
 Dedicated Security Team
 Greater Investment in Security Infrastructure
 Cloud homogeneity makes security auditing/testing simpler
 Clouds enable automated security management and real-time detection of system
tampering
 Rapid Re-Constitution of Services
 Redundancy / Disaster Recovery
.
Cloud Security Challenges
 Trusting vendor’s security model
 Multi-tenancy
 Data ownership issues
 QoS guarantees
 Attraction to hackers (high-value target)
Security of virtual OSs in the cloud
 Obtaining support from cloud vendor for security related investigations
Cloud Security Challenges Indirect administrator accountability
 Proprietary cloud vendor implementations can’t be examined
 Loss of physical control
 Possibility for massive outages
 Encryption needs for cloud computing
 Encrypting access to the cloud resource control interface
 Encrypting administrative access to OS instances
 Encrypting access to applications
 Encrypting application data at rest
.
Typical use case of provisioning a virtual machine
.
.
Typical use case of provisioning a virtual machine
 The management environment consists of components required to effectively
deliver services to consumers. The various services offered span from image
management and provisioning of machines to billing, accounting, metering,
and more. The cloud management system (CMS) forms the heart of the
management environment along with the hardware components.
 The managed environment is composed of physical servers and in turn the
virtual servers that are “managed-by” the management environment. The
servers in the managed environment belong to a customer pool; where
customers or users can create virtual servers on-demand and scale up/down
as needed.
 The management environment controls and processes all incoming requests
to create, destroy, manage, and monitor virtual machines and storage devices.
In the context of a public cloud, the users get direct access to the VMs created
in the managed environment, through the Internet. They can access the
machines after they are provisioned by the management layer.
.
Typical use case of provisioning a virtual machine
The previous figure describes the following actions:
1. User makes a request to create a VM by logging onto the cloud portal.
2. The request is intercepted by the request manager and is forwarded to the
management environment.
3. The management environment, on receiving the request, interprets it and applies
to it provisioning logic to create a VM from the set of available physical servers.
4. External storage is attached to the VM from a storage area network (SAN) store
during provisioning in addition to the local storage.
5. After the VM is provisioned and ready to use, the user is notified of this
information and finally gains total control of the VM. The user can access this VM
through the public Internet because the VM has a public IP address (e.g. through
SSH).
.
Cloud Ecosystem
Figure. The cloud ecosystem for building private clouds. (a) Cloud consumers need flexible infrastructure on demand. (b) Cloud
management provides remote and secure interfaces for creating, controlling, and monitoring virtualized resources on an
infrastructure-as-a-service cloud. (c) Virtual infrastructure (VI) management provides primitives to schedule and manage VMs
across multiple physical hosts. (d) VM managers provide simple primitives (start, stop, suspend) to manage VMs on a single
host.
Figure from Virtual Infrastructure Management in Private and Hybrid Clouds, Internet Computing, September 2009.

Mais conteúdo relacionado

Mais procurados

Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud service management
Cloud service managementCloud service management
Cloud service managementgaurav jain
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management AngelineR
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computingsashi799
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
The NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingThe NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingAlexis Blandin
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1Sandip Kadam
 
Cloud Technology Ecosystems
Cloud Technology EcosystemsCloud Technology Ecosystems
Cloud Technology EcosystemsJoseph Jacks
 

Mais procurados (20)

Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud service management
Cloud service managementCloud service management
Cloud service management
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
 
Fundamental Cloud Architectures
Fundamental Cloud ArchitecturesFundamental Cloud Architectures
Fundamental Cloud Architectures
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
 
The NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingThe NIST Definition of Cloud Computing
The NIST Definition of Cloud Computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Definition of cloud computing
Definition of cloud computingDefinition of cloud computing
Definition of cloud computing
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Module 3-cloud computing
Module 3-cloud computingModule 3-cloud computing
Module 3-cloud computing
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
Cloud Technology Ecosystems
Cloud Technology EcosystemsCloud Technology Ecosystems
Cloud Technology Ecosystems
 

Semelhante a Cloud models and platforms

Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4kongara
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJagriti Rai
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAlessandro Iudica
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computingkevnikool
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1ADEOLA ADISA
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxUtkarshKumar608655
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 

Semelhante a Cloud models and platforms (20)

Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
Cloud notes 1
Cloud notes 1Cloud notes 1
Cloud notes 1
 
Cloud management
Cloud managementCloud management
Cloud management
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
cloud computing
cloud computing cloud computing
cloud computing
 
What Is Cloud Computing?
What Is Cloud Computing?What Is Cloud Computing?
What Is Cloud Computing?
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 

Mais de Prabhat gangwar (20)

Middleware
MiddlewareMiddleware
Middleware
 
Pseudolocalization
PseudolocalizationPseudolocalization
Pseudolocalization
 
Mule anypoint studio
Mule anypoint studioMule anypoint studio
Mule anypoint studio
 
Mule anypoint platform
Mule anypoint platformMule anypoint platform
Mule anypoint platform
 
What is cluster analysis
What is cluster analysisWhat is cluster analysis
What is cluster analysis
 
clustering and load balancing
clustering and load balancingclustering and load balancing
clustering and load balancing
 
Middleware systems overview and introduction
Middleware systems overview and introductionMiddleware systems overview and introduction
Middleware systems overview and introduction
 
Restful api modeling language
Restful api modeling languageRestful api modeling language
Restful api modeling language
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule fundamentals
Mule fundamentalsMule fundamentals
Mule fundamentals
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Oracle vs-mulesoft-api-manager-features
Oracle vs-mulesoft-api-manager-featuresOracle vs-mulesoft-api-manager-features
Oracle vs-mulesoft-api-manager-features
 
Oracle real application_cluster
Oracle real application_clusterOracle real application_cluster
Oracle real application_cluster
 
Introducing adf business components
Introducing adf business componentsIntroducing adf business components
Introducing adf business components
 
File transfer methods
File transfer methodsFile transfer methods
File transfer methods
 
Ftp tftp
Ftp tftpFtp tftp
Ftp tftp
 
Bpm
BpmBpm
Bpm
 
Global warming
Global warmingGlobal warming
Global warming
 
Seo
SeoSeo
Seo
 
Vedic mathmetics
Vedic mathmeticsVedic mathmetics
Vedic mathmetics
 

Último

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Cloud models and platforms

  • 1. Cloud Models and Platforms
  • 2. A Working Definition of Cloud Computing  Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.  This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. .
  • 3. Objectives of Cloud Computing  Elasticity: Ability to scale virtual machines resources up or down  On-demand usage: Ability to add or delete computing power (CPU, memory), and storage according to demand  Pay-per-use: Pay only for what you use  Multitenancy: Ability to have multiplecustomers access their servers in the data center in an isolated manner .
  • 4. 5 Essential Cloud Characteristics  On-demand self-service  Broad network access  Resource pooling  Location independence  Rapid elasticity  Measured service .
  • 5. 3 Cloud Service Models  Cloud Software as a Service (SaaS)  The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure and accessible from various client devices through a thin client interface such as a Web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.  Cloud Platform as a Service (PaaS)  The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created applications using programming languages and tools supported by the provider (e.g., Java, Python, .Net). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, or storage, but the consumer has control over the deployed applications and possibly application hosting environment configurations.  Cloud Infrastructure as a Service (IaaS)  The capability provided to the consumer is to rent processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly select networking components (e.g., firewalls, load balancers).  To be considered “cloud” they must be deployed on top of cloud infrastructure that has the key characteristics .
  • 8. 3 Features of Mature SaaS Applications  SaaS is hosting applications on the Internet as a service (both consumer and enterprise)  Features of Mature Saas applications:  Scalable  Handle growing amounts of work in a graceful manner  Multi-tenancy  One application instance may be serving hundreds of companies  Opposite of multi-instance where each customer is provisioned their own server running one instance  Metadata driven configurability  Instead of customizing the application for a customer (requiring code changes), one allows the user to configure the application through metadata .
  • 9. SaaS Maturity Levels  Level 1: Ad-Hoc/Custom  Level 2: Configurable  Level 3: Configurable, Multi-Tenant-Efficient  Level 4: Scalable, Configurable, Multi-Tenant-Efficient Source: Microsoft MSDN Architecture Center .
  • 10. 3 Cloud Deployment Models Private cloud  The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.  Public cloud  Mega-scale cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.  Hybrid cloud  The cloud infrastructure is a composition of two or more clouds (private or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability .
  • 11. Common Cloud Characteristics  Cloud computing often leverages:  Massive scale  Homogeneity  Virtualization  Low cost software  Geographic distribution  Advanced security technologies .
  • 12. Security is the Major Issue  Cloud computing often leverages:  Massive scale  Homogeneity  Virtualization  Low cost software  Geographic distribution  Advanced security technologies .
  • 13. Top Motivators for Adopting Cloud Computing Source: IBM Tech Trends Report 2011 .
  • 14. Cloud Security Advantages  Shifting public data to a external cloud reduces the exposure of the internal sensitive data  Dedicated Security Team  Greater Investment in Security Infrastructure  Cloud homogeneity makes security auditing/testing simpler  Clouds enable automated security management and real-time detection of system tampering  Rapid Re-Constitution of Services  Redundancy / Disaster Recovery .
  • 15. Cloud Security Challenges  Trusting vendor’s security model  Multi-tenancy  Data ownership issues  QoS guarantees  Attraction to hackers (high-value target) Security of virtual OSs in the cloud  Obtaining support from cloud vendor for security related investigations
  • 16. Cloud Security Challenges Indirect administrator accountability  Proprietary cloud vendor implementations can’t be examined  Loss of physical control  Possibility for massive outages  Encryption needs for cloud computing  Encrypting access to the cloud resource control interface  Encrypting administrative access to OS instances  Encrypting access to applications  Encrypting application data at rest .
  • 17. Typical use case of provisioning a virtual machine . .
  • 18. Typical use case of provisioning a virtual machine  The management environment consists of components required to effectively deliver services to consumers. The various services offered span from image management and provisioning of machines to billing, accounting, metering, and more. The cloud management system (CMS) forms the heart of the management environment along with the hardware components.  The managed environment is composed of physical servers and in turn the virtual servers that are “managed-by” the management environment. The servers in the managed environment belong to a customer pool; where customers or users can create virtual servers on-demand and scale up/down as needed.  The management environment controls and processes all incoming requests to create, destroy, manage, and monitor virtual machines and storage devices. In the context of a public cloud, the users get direct access to the VMs created in the managed environment, through the Internet. They can access the machines after they are provisioned by the management layer. .
  • 19. Typical use case of provisioning a virtual machine The previous figure describes the following actions: 1. User makes a request to create a VM by logging onto the cloud portal. 2. The request is intercepted by the request manager and is forwarded to the management environment. 3. The management environment, on receiving the request, interprets it and applies to it provisioning logic to create a VM from the set of available physical servers. 4. External storage is attached to the VM from a storage area network (SAN) store during provisioning in addition to the local storage. 5. After the VM is provisioned and ready to use, the user is notified of this information and finally gains total control of the VM. The user can access this VM through the public Internet because the VM has a public IP address (e.g. through SSH). .
  • 20. Cloud Ecosystem Figure. The cloud ecosystem for building private clouds. (a) Cloud consumers need flexible infrastructure on demand. (b) Cloud management provides remote and secure interfaces for creating, controlling, and monitoring virtualized resources on an infrastructure-as-a-service cloud. (c) Virtual infrastructure (VI) management provides primitives to schedule and manage VMs across multiple physical hosts. (d) VM managers provide simple primitives (start, stop, suspend) to manage VMs on a single host. Figure from Virtual Infrastructure Management in Private and Hybrid Clouds, Internet Computing, September 2009.

Notas do Editor

  1. Note 1: Cloud computing is still an evolving paradigm. Its definitions, use cases, underlying technologies, issues, risks, and benefits will be refined in a spirited debate by the public and private sectors. These definitions, attributes, and characteristics will evolve and change over time. Note 2: The cloud computing industry represents a large ecosystem of many models, vendors, and market niches. This definition attempts to encompass all of the various cloud approaches
  2. ISDM, IBM System Director and blade servers are shown to depict the components of a cloud system.