SlideShare uma empresa Scribd logo
1 de 82
Baixar para ler offline
2: Cloud Computing Paradigms

                              Zubair Nabi

                    zubair.nabi@itu.edu.pk


                            April 17, 2013




Zubair Nabi        2: Cloud Computing Paradigms   April 17, 2013   1 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   2 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   3 / 22
Cloud computing



      A realization of utility computing in which computation, storage, and
      services are offered as a metered service




  Zubair Nabi              2: Cloud Computing Paradigms             April 17, 2013   4 / 22
Cloud computing



      A realization of utility computing in which computation, storage, and
      services are offered as a metered service
      Encompasses applications delivered as services over the Internet and
      hardware and software in the datacenters that enable those services




  Zubair Nabi              2: Cloud Computing Paradigms             April 17, 2013   4 / 22
Cloud computing



      A realization of utility computing in which computation, storage, and
      services are offered as a metered service
      Encompasses applications delivered as services over the Internet and
      hardware and software in the datacenters that enable those services
                Software as a Service (SaaS)




  Zubair Nabi                   2: Cloud Computing Paradigms        April 17, 2013   4 / 22
Cloud computing



      A realization of utility computing in which computation, storage, and
      services are offered as a metered service
      Encompasses applications delivered as services over the Internet and
      hardware and software in the datacenters that enable those services
                Software as a Service (SaaS)
      Public Cloud: If available to the public as a pay-as-you-go model, e.g.
      Amazon Web Services, Google AppEngine, and Microsoft Azure




  Zubair Nabi                   2: Cloud Computing Paradigms        April 17, 2013   4 / 22
Cloud computing



      A realization of utility computing in which computation, storage, and
      services are offered as a metered service
      Encompasses applications delivered as services over the Internet and
      hardware and software in the datacenters that enable those services
                Software as a Service (SaaS)
      Public Cloud: If available to the public as a pay-as-you-go model, e.g.
      Amazon Web Services, Google AppEngine, and Microsoft Azure
      Private Cloud: Internal datacenters of an organization that are not
      publicly accessible




  Zubair Nabi                   2: Cloud Computing Paradigms        April 17, 2013   4 / 22
Advantages



Advantages to both service providers and end users




  Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance




  Zubair Nabi                    2: Cloud Computing Paradigms     April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning




  Zubair Nabi                    2: Cloud Computing Paradigms     April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning
                No need to build, provision, and maintain a datacenter




  Zubair Nabi                    2: Cloud Computing Paradigms            April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning
                No need to build, provision, and maintain a datacenter
                On the fly scaling




  Zubair Nabi                    2: Cloud Computing Paradigms            April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning
                No need to build, provision, and maintain a datacenter
                On the fly scaling
  2   End users:
                “Anytime, anywhere” access




  Zubair Nabi                    2: Cloud Computing Paradigms            April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning
                No need to build, provision, and maintain a datacenter
                On the fly scaling
  2   End users:
                “Anytime, anywhere” access
                Share data and collaborate easily




  Zubair Nabi                    2: Cloud Computing Paradigms            April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning
                No need to build, provision, and maintain a datacenter
                On the fly scaling
  2   End users:
                “Anytime, anywhere” access
                Share data and collaborate easily
                Safeguard data stored in the infrastructure (debatable)




  Zubair Nabi                     2: Cloud Computing Paradigms            April 17, 2013   5 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   6 / 22
History



      Phenomenal growth of Web services in late 90s and early 2000s




  Zubair Nabi             2: Cloud Computing Paradigms         April 17, 2013   7 / 22
History



      Phenomenal growth of Web services in late 90s and early 2000s
      Large Internet companies, including Amazon, eBay, Google, Microsoft,
      Yahoo, etc., already had massive infrastructure




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   7 / 22
History



      Phenomenal growth of Web services in late 90s and early 2000s
      Large Internet companies, including Amazon, eBay, Google, Microsoft,
      Yahoo, etc., already had massive infrastructure
      To keep up with demand, these companies also developed scalable
      software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.)




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   7 / 22
History



      Phenomenal growth of Web services in late 90s and early 2000s
      Large Internet companies, including Amazon, eBay, Google, Microsoft,
      Yahoo, etc., already had massive infrastructure
      To keep up with demand, these companies also developed scalable
      software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.)
      They also acquired the operational expertise to deter potential physical
      and electronic attacks




  Zubair Nabi              2: Cloud Computing Paradigms             April 17, 2013   7 / 22
History



      Phenomenal growth of Web services in late 90s and early 2000s
      Large Internet companies, including Amazon, eBay, Google, Microsoft,
      Yahoo, etc., already had massive infrastructure
      To keep up with demand, these companies also developed scalable
      software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.)
      They also acquired the operational expertise to deter potential physical
      and electronic attacks
      Therefore, they had already created extremely large datacenters to
      leverage statistical multiplexing and bulk purchasing of infrastructure




  Zubair Nabi               2: Cloud Computing Paradigms             April 17, 2013   7 / 22
Incentive for providers



      Incentives include revenue, leveraging existing investment, defending a
      franchise, attacking an incumbent, leveraging customer relationships, and
      becoming a platform




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   8 / 22
Incentive for providers



      Incentives include revenue, leveraging existing investment, defending a
      franchise, attacking an incumbent, leveraging customer relationships, and
      becoming a platform
      Data centers are being established in seemingly arbitrary locations




  Zubair Nabi              2: Cloud Computing Paradigms            April 17, 2013   8 / 22
Incentive for providers



      Incentives include revenue, leveraging existing investment, defending a
      franchise, attacking an incumbent, leveraging customer relationships, and
      becoming a platform
      Data centers are being established in seemingly arbitrary locations
      Reasons for choosing a location include costs of electricity, cooling,
      labour, property, and taxes




  Zubair Nabi               2: Cloud Computing Paradigms             April 17, 2013   8 / 22
Incentive for providers



      Incentives include revenue, leveraging existing investment, defending a
      franchise, attacking an incumbent, leveraging customer relationships, and
      becoming a platform
      Data centers are being established in seemingly arbitrary locations
      Reasons for choosing a location include costs of electricity, cooling,
      labour, property, and taxes
      Cooling and electricity account for 1/3rd of all costs!




  Zubair Nabi               2: Cloud Computing Paradigms             April 17, 2013   8 / 22
Incentive for providers



      Incentives include revenue, leveraging existing investment, defending a
      franchise, attacking an incumbent, leveraging customer relationships, and
      becoming a platform
      Data centers are being established in seemingly arbitrary locations
      Reasons for choosing a location include costs of electricity, cooling,
      labour, property, and taxes
      Cooling and electricity account for 1/3rd of all costs!
      Cheaper to ship data over fiber optic cables than to ship electricity over
      high-voltage transmission lines




  Zubair Nabi               2: Cloud Computing Paradigms             April 17, 2013   8 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   9 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”
      For instance:
                Payment model in Web 1.0: Contractual arrangement with a payment
                processing service such as VeriSign or Authorize.net; making it hard for
                small businesses to accept credit card payment online




  Zubair Nabi                     2: Cloud Computing Paradigms               April 17, 2013   9 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”
      For instance:
                Payment model in Web 1.0: Contractual arrangement with a payment
                processing service such as VeriSign or Authorize.net; making it hard for
                small businesses to accept credit card payment online
                Web 2.0: With PayPal-like services anyone can sign up and accept credit
                payments without a contract and a long-term commitment




  Zubair Nabi                    2: Cloud Computing Paradigms               April 17, 2013   9 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”
      For instance:
                Payment model in Web 1.0: Contractual arrangement with a payment
                processing service such as VeriSign or Authorize.net; making it hard for
                small businesses to accept credit card payment online
                Web 2.0: With PayPal-like services anyone can sign up and accept credit
                payments without a contract and a long-term commitment
      Another example:
                Ad revenue model in Web 1.0: Set up a relationship with an ad placement
                company, such as DoubleClick




  Zubair Nabi                    2: Cloud Computing Paradigms               April 17, 2013   9 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”
      For instance:
                Payment model in Web 1.0: Contractual arrangement with a payment
                processing service such as VeriSign or Authorize.net; making it hard for
                small businesses to accept credit card payment online
                Web 2.0: With PayPal-like services anyone can sign up and accept credit
                payments without a contract and a long-term commitment
      Another example:
                Ad revenue model in Web 1.0: Set up a relationship with an ad placement
                company, such as DoubleClick
                Web 2.0: Use Google AdSense




  Zubair Nabi                    2: Cloud Computing Paradigms               April 17, 2013   9 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”
      For instance:
                Payment model in Web 1.0: Contractual arrangement with a payment
                processing service such as VeriSign or Authorize.net; making it hard for
                small businesses to accept credit card payment online
                Web 2.0: With PayPal-like services anyone can sign up and accept credit
                payments without a contract and a long-term commitment
      Another example:
                Ad revenue model in Web 1.0: Set up a relationship with an ad placement
                company, such as DoubleClick
                Web 2.0: Use Google AdSense
      This same model was used by Amazon Web Services in 2006:
      pay-as-you-go computing with no contract, with the only requirement
      being a credit card


  Zubair Nabi                    2: Cloud Computing Paradigms               April 17, 2013   9 / 22
New applications



      Mobile applications: Require high availability and rely on large data sets
      that are most conveniently hosted in large datacenters




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   10 / 22
New applications



      Mobile applications: Require high availability and rely on large data sets
      that are most conveniently hosted in large datacenters
      Parallel batch processing: Analytics jobs that analyze terabytes of data
      and can take hours to finish can leverage the “cost associativity” of the
      cloud




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   10 / 22
New applications



      Mobile applications: Require high availability and rely on large data sets
      that are most conveniently hosted in large datacenters
      Parallel batch processing: Analytics jobs that analyze terabytes of data
      and can take hours to finish can leverage the “cost associativity” of the
      cloud
      Business analytics: Understanding customers, supply chains, buying
      habits, ranking, and so on




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   10 / 22
New applications



      Mobile applications: Require high availability and rely on large data sets
      that are most conveniently hosted in large datacenters
      Parallel batch processing: Analytics jobs that analyze terabytes of data
      and can take hours to finish can leverage the “cost associativity” of the
      cloud
      Business analytics: Understanding customers, supply chains, buying
      habits, ranking, and so on
      Computation offloading: Compute-intensive tasks are offloaded to the
      cloud. For instance, Matlab, Mathematica, image rendering, 3D
      animations, etc.




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   10 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   11 / 22
Classes of utility computing



      Every application needs computation, storage, and quite possibly
      communication




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   12 / 22
Classes of utility computing



      Every application needs computation, storage, and quite possibly
      communication
      These resources need to be virtualized to achieve elasticity and the
      illusion of infinite capacity




  Zubair Nabi              2: Cloud Computing Paradigms            April 17, 2013   12 / 22
Classes of utility computing



      Every application needs computation, storage, and quite possibly
      communication
      These resources need to be virtualized to achieve elasticity and the
      illusion of infinite capacity
      The details of statistical multiplexing and sharing is abstracted away from
      the programmer




  Zubair Nabi               2: Cloud Computing Paradigms            April 17, 2013   12 / 22
Classes of utility computing



      Every application needs computation, storage, and quite possibly
      communication
      These resources need to be virtualized to achieve elasticity and the
      illusion of infinite capacity
      The details of statistical multiplexing and sharing is abstracted away from
      the programmer
      Different utility computing offerings can be distinguished on the basis of
      the abstraction presented to the programmer




  Zubair Nabi               2: Cloud Computing Paradigms            April 17, 2013   12 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware




  Zubair Nabi              2: Cloud Computing Paradigms   April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards




  Zubair Nabi              2: Cloud Computing Paradigms         April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards
      Employed by Amazon EC2




  Zubair Nabi              2: Cloud Computing Paradigms         April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards
      Employed by Amazon EC2
      A very thin API is exposed to request and configure virtualized hardware




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards
      Employed by Amazon EC2
      A very thin API is exposed to request and configure virtualized hardware
      No bar on the kinds of applications that can be hosted




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards
      Employed by Amazon EC2
      A very thin API is exposed to request and configure virtualized hardware
      No bar on the kinds of applications that can be hosted
                Low level virtualization, block-device storage, and IP-level connectivity
                allow developers to design any application




  Zubair Nabi                     2: Cloud Computing Paradigms                 April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards
      Employed by Amazon EC2
      A very thin API is exposed to request and configure virtualized hardware
      No bar on the kinds of applications that can be hosted
                Low level virtualization, block-device storage, and IP-level connectivity
                allow developers to design any application
      On the downside, scalability and failover are application-dependent




  Zubair Nabi                     2: Cloud Computing Paradigms                 April 17, 2013   13 / 22
Domain-specific platform



      Target traditional web applications




  Zubair Nabi               2: Cloud Computing Paradigms   April 17, 2013   14 / 22
Domain-specific platform



      Target traditional web applications
      Enforce an application structure of clean separation between a stateless
      computation tier and a stateful storage tier




  Zubair Nabi               2: Cloud Computing Paradigms          April 17, 2013   14 / 22
Domain-specific platform



      Target traditional web applications
      Enforce an application structure of clean separation between a stateless
      computation tier and a stateful storage tier
      Employed by Google AppEngine




  Zubair Nabi               2: Cloud Computing Paradigms          April 17, 2013   14 / 22
Domain-specific platform



      Target traditional web applications
      Enforce an application structure of clean separation between a stateless
      computation tier and a stateful storage tier
      Employed by Google AppEngine
      Applications are expected to be request-reply based




  Zubair Nabi               2: Cloud Computing Paradigms          April 17, 2013   14 / 22
Domain-specific platform



      Target traditional web applications
      Enforce an application structure of clean separation between a stateless
      computation tier and a stateful storage tier
      Employed by Google AppEngine
      Applications are expected to be request-reply based
      In contrast to the bare metal hardware abstraction, enable automatic
      scaling and high-availability mechanisms




  Zubair Nabi               2: Cloud Computing Paradigms          April 17, 2013   14 / 22
Domain-specific platform



      Target traditional web applications
      Enforce an application structure of clean separation between a stateless
      computation tier and a stateful storage tier
      Employed by Google AppEngine
      Applications are expected to be request-reply based
      In contrast to the bare metal hardware abstraction, enable automatic
      scaling and high-availability mechanisms
      Not suitable for general-purpose computing




  Zubair Nabi               2: Cloud Computing Paradigms          April 17, 2013   14 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience




  Zubair Nabi             2: Cloud Computing Paradigms         April 17, 2013   15 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience
      Offered by Microsoft’s Azure




  Zubair Nabi              2: Cloud Computing Paradigms        April 17, 2013   15 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience
      Offered by Microsoft’s Azure
      Applications are written using .NET libraries and compiled to the Common
      Language Runtime (A language-independent management environment)




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   15 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience
      Offered by Microsoft’s Azure
      Applications are written using .NET libraries and compiled to the Common
      Language Runtime (A language-independent management environment)
      Supports general purpose computing




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   15 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience
      Offered by Microsoft’s Azure
      Applications are written using .NET libraries and compiled to the Common
      Language Runtime (A language-independent management environment)
      Supports general purpose computing
      Users have control over the choice of language but not the underlying OS
      or runtime




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   15 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience
      Offered by Microsoft’s Azure
      Applications are written using .NET libraries and compiled to the Common
      Language Runtime (A language-independent management environment)
      Supports general purpose computing
      Users have control over the choice of language but not the underlying OS
      or runtime
      Provide some degree of automatic failover and scalability but require
      some help from the developer in the form of declaration of some
      application properties




  Zubair Nabi              2: Cloud Computing Paradigms            April 17, 2013   15 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   16 / 22
Elasticity




      Pay-as-you-go model: Only pay for what you use




  Zubair Nabi             2: Cloud Computing Paradigms   April 17, 2013   17 / 22
Elasticity




      Pay-as-you-go model: Only pay for what you use
      Add or remove resources at a fine grain (such as one server at a time)
      with minimal lead time




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   17 / 22
Elasticity




      Pay-as-you-go model: Only pay for what you use
      Add or remove resources at a fine grain (such as one server at a time)
      with minimal lead time
      Useful for traffic spikes such as “Black Friday”




  Zubair Nabi               2: Cloud Computing Paradigms         April 17, 2013   17 / 22
Elasticity




      Pay-as-you-go model: Only pay for what you use
      Add or remove resources at a fine grain (such as one server at a time)
      with minimal lead time
      Useful for traffic spikes such as “Black Friday”
      Over time, hardware costs come down and vendors acquire updated
      hardware. Thus, benefiting the tenant




  Zubair Nabi               2: Cloud Computing Paradigms         April 17, 2013   17 / 22
Reasons for companies to migrate to the cloud




      Pay separately per resource: Pay proportional to resource requirements




  Zubair Nabi             2: Cloud Computing Paradigms         April 17, 2013   18 / 22
Reasons for companies to migrate to the cloud




      Pay separately per resource: Pay proportional to resource requirements
      Power, cooling, and physical plant costs: Cost of electricity and
      cooling already factored in




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   18 / 22
Reasons for companies to migrate to the cloud




      Pay separately per resource: Pay proportional to resource requirements
      Power, cooling, and physical plant costs: Cost of electricity and
      cooling already factored in
      Man-power costs: No need to employ sysadmins




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   18 / 22
Reasons for companies to migrate to the cloud




      Pay separately per resource: Pay proportional to resource requirements
      Power, cooling, and physical plant costs: Cost of electricity and
      cooling already factored in
      Man-power costs: No need to employ sysadmins
      Operational costs: Low-level upgrades and software patches
      responsibility of the provider




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   18 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   19 / 22
Obstacles




 1    Service availability: Possibility of cloud outage




  Zubair Nabi               2: Cloud Computing Paradigms   April 17, 2013   20 / 22
Obstacles




 1    Service availability: Possibility of cloud outage
 2    Data lock-in: Reliance on cloud specific APIs




  Zubair Nabi               2: Cloud Computing Paradigms   April 17, 2013   20 / 22
Obstacles




 1    Service availability: Possibility of cloud outage
 2    Data lock-in: Reliance on cloud specific APIs
 3    Security: Requires strong encrypted storage, VLANs, and network
      middleboxes (firewalls, etc.)




  Zubair Nabi               2: Cloud Computing Paradigms      April 17, 2013   20 / 22
Obstacles




 1    Service availability: Possibility of cloud outage
 2    Data lock-in: Reliance on cloud specific APIs
 3    Security: Requires strong encrypted storage, VLANs, and network
      middleboxes (firewalls, etc.)
 4    Data transfer bottlenecks: Moving large amounts of data in and out is
      expensive




  Zubair Nabi               2: Cloud Computing Paradigms        April 17, 2013   20 / 22
Obstacles




 1    Service availability: Possibility of cloud outage
 2    Data lock-in: Reliance on cloud specific APIs
 3    Security: Requires strong encrypted storage, VLANs, and network
      middleboxes (firewalls, etc.)
 4    Data transfer bottlenecks: Moving large amounts of data in and out is
      expensive
 5    Performance unpredictability: Resource sharing between applications




  Zubair Nabi               2: Cloud Computing Paradigms        April 17, 2013   20 / 22
Obstacles (2)


  6   Scalable storage: No standard model to arbitrarily scale storage up and
      down on-demand while ensuring data durability and high availability




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   21 / 22
Obstacles (2)


  6   Scalable storage: No standard model to arbitrarily scale storage up and
      down on-demand while ensuring data durability and high availability
  7   Bugs in large-scale distributed systems: Hard to debug large-scale
      applications in full deployment




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   21 / 22
Obstacles (2)


  6   Scalable storage: No standard model to arbitrarily scale storage up and
      down on-demand while ensuring data durability and high availability
  7   Bugs in large-scale distributed systems: Hard to debug large-scale
      applications in full deployment
  8   Scaling quickly: Automatically scaling while conserving resources and
      money is an open ended problem




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   21 / 22
Obstacles (2)


  6   Scalable storage: No standard model to arbitrarily scale storage up and
      down on-demand while ensuring data durability and high availability
  7   Bugs in large-scale distributed systems: Hard to debug large-scale
      applications in full deployment
  8   Scaling quickly: Automatically scaling while conserving resources and
      money is an open ended problem
  9   Reputation fate sharing: Bad behaviour by one tenant can reflect badly
      on the rest




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   21 / 22
Obstacles (2)


  6   Scalable storage: No standard model to arbitrarily scale storage up and
      down on-demand while ensuring data durability and high availability
  7   Bugs in large-scale distributed systems: Hard to debug large-scale
      applications in full deployment
  8   Scaling quickly: Automatically scaling while conserving resources and
      money is an open ended problem
  9   Reputation fate sharing: Bad behaviour by one tenant can reflect badly
      on the rest
 10   Software licensing: Gap between pay-as-you-go model and software
      licensing




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   21 / 22
References




 1    Above the Clouds: A Berkeley View of Cloud Computing" by Michael
      Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz,
      Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica,
      and Matei Zaharia. Technical Report EECS-2009-28, EECS Department,
      University of California, Berkeley.




  Zubair Nabi             2: Cloud Computing Paradigms         April 17, 2013   22 / 22

Mais conteúdo relacionado

Mais procurados

Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computingNitish Awasthi (anitish_225)
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionJason TC HOU (侯宗成)
 
Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)Monica Kambala
 
An introduction to M2M / IoT technologies
An introduction to M2M / IoT technologiesAn introduction to M2M / IoT technologies
An introduction to M2M / IoT technologiesPascal Bodin
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling TechnologiesPrakash Honnur
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxDr Geetha Mohan
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined NetworksShreeya Shah
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)FabMinds
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An IntroductionRavindra Dastikop
 
IOT15_Unit6.pptx
IOT15_Unit6.pptxIOT15_Unit6.pptx
IOT15_Unit6.pptxsuptel
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPTSeminar Links
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)Milson Munakami
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
Introduction to GCP (Google Cloud Platform)
Introduction to GCP (Google Cloud Platform)Introduction to GCP (Google Cloud Platform)
Introduction to GCP (Google Cloud Platform)Pulkit Gupta
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Majid Hajibaba
 

Mais procurados (20)

Analytics in IOT
Analytics in IOTAnalytics in IOT
Analytics in IOT
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief Introduction
 
Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)
 
An introduction to M2M / IoT technologies
An introduction to M2M / IoT technologiesAn introduction to M2M / IoT technologies
An introduction to M2M / IoT technologies
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
 
Wot
WotWot
Wot
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
Raspberry Pi
Raspberry Pi Raspberry Pi
Raspberry Pi
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An Introduction
 
Edge computing
Edge computingEdge computing
Edge computing
 
IOT15_Unit6.pptx
IOT15_Unit6.pptxIOT15_Unit6.pptx
IOT15_Unit6.pptx
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
Introduction to GCP (Google Cloud Platform)
Introduction to GCP (Google Cloud Platform)Introduction to GCP (Google Cloud Platform)
Introduction to GCP (Google Cloud Platform)
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
 

Destaque

AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!Zubair Nabi
 
Topic 3: Large-scale Distributed Systems
Topic 3: Large-scale Distributed SystemsTopic 3: Large-scale Distributed Systems
Topic 3: Large-scale Distributed SystemsZubair Nabi
 
Lab 4: Interfacing with Cassandra
Lab 4: Interfacing with CassandraLab 4: Interfacing with Cassandra
Lab 4: Interfacing with CassandraZubair Nabi
 
Topic 11: Google Filesystem
Topic 11: Google FilesystemTopic 11: Google Filesystem
Topic 11: Google FilesystemZubair Nabi
 
Topic 4: Concurrency
Topic 4: ConcurrencyTopic 4: Concurrency
Topic 4: ConcurrencyZubair Nabi
 
AOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksAOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksZubair Nabi
 
MapReduce and DBMS Hybrids
MapReduce and DBMS HybridsMapReduce and DBMS Hybrids
MapReduce and DBMS HybridsZubair Nabi
 
AOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device DriversAOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device DriversZubair Nabi
 
Topic 5: MapReduce Theory and Implementation
Topic 5: MapReduce Theory and ImplementationTopic 5: MapReduce Theory and Implementation
Topic 5: MapReduce Theory and ImplementationZubair Nabi
 
AOS Lab 5: System calls
AOS Lab 5: System callsAOS Lab 5: System calls
AOS Lab 5: System callsZubair Nabi
 
Lab 3: Writing a Naiad Application
Lab 3: Writing a Naiad ApplicationLab 3: Writing a Naiad Application
Lab 3: Writing a Naiad ApplicationZubair Nabi
 
AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!Zubair Nabi
 
The Anatomy of Web Censorship in Pakistan
The Anatomy of Web Censorship in PakistanThe Anatomy of Web Censorship in Pakistan
The Anatomy of Web Censorship in PakistanZubair Nabi
 
Topic 7: Shortcomings in the MapReduce Paradigm
Topic 7: Shortcomings in the MapReduce ParadigmTopic 7: Shortcomings in the MapReduce Paradigm
Topic 7: Shortcomings in the MapReduce ParadigmZubair Nabi
 
MapReduce Application Scripting
MapReduce Application ScriptingMapReduce Application Scripting
MapReduce Application ScriptingZubair Nabi
 
Topic 13: Cloud Stacks
Topic 13: Cloud StacksTopic 13: Cloud Stacks
Topic 13: Cloud StacksZubair Nabi
 
Topic 8: Enhancements and Alternative Architectures
Topic 8: Enhancements and Alternative ArchitecturesTopic 8: Enhancements and Alternative Architectures
Topic 8: Enhancements and Alternative ArchitecturesZubair Nabi
 
AOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on itAOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on itZubair Nabi
 
Lab 1: Introduction to Amazon EC2 and MPI
Lab 1: Introduction to Amazon EC2 and MPILab 1: Introduction to Amazon EC2 and MPI
Lab 1: Introduction to Amazon EC2 and MPIZubair Nabi
 
AOS Lab 6: Scheduling
AOS Lab 6: SchedulingAOS Lab 6: Scheduling
AOS Lab 6: SchedulingZubair Nabi
 

Destaque (20)

AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!
 
Topic 3: Large-scale Distributed Systems
Topic 3: Large-scale Distributed SystemsTopic 3: Large-scale Distributed Systems
Topic 3: Large-scale Distributed Systems
 
Lab 4: Interfacing with Cassandra
Lab 4: Interfacing with CassandraLab 4: Interfacing with Cassandra
Lab 4: Interfacing with Cassandra
 
Topic 11: Google Filesystem
Topic 11: Google FilesystemTopic 11: Google Filesystem
Topic 11: Google Filesystem
 
Topic 4: Concurrency
Topic 4: ConcurrencyTopic 4: Concurrency
Topic 4: Concurrency
 
AOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksAOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocks
 
MapReduce and DBMS Hybrids
MapReduce and DBMS HybridsMapReduce and DBMS Hybrids
MapReduce and DBMS Hybrids
 
AOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device DriversAOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device Drivers
 
Topic 5: MapReduce Theory and Implementation
Topic 5: MapReduce Theory and ImplementationTopic 5: MapReduce Theory and Implementation
Topic 5: MapReduce Theory and Implementation
 
AOS Lab 5: System calls
AOS Lab 5: System callsAOS Lab 5: System calls
AOS Lab 5: System calls
 
Lab 3: Writing a Naiad Application
Lab 3: Writing a Naiad ApplicationLab 3: Writing a Naiad Application
Lab 3: Writing a Naiad Application
 
AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!
 
The Anatomy of Web Censorship in Pakistan
The Anatomy of Web Censorship in PakistanThe Anatomy of Web Censorship in Pakistan
The Anatomy of Web Censorship in Pakistan
 
Topic 7: Shortcomings in the MapReduce Paradigm
Topic 7: Shortcomings in the MapReduce ParadigmTopic 7: Shortcomings in the MapReduce Paradigm
Topic 7: Shortcomings in the MapReduce Paradigm
 
MapReduce Application Scripting
MapReduce Application ScriptingMapReduce Application Scripting
MapReduce Application Scripting
 
Topic 13: Cloud Stacks
Topic 13: Cloud StacksTopic 13: Cloud Stacks
Topic 13: Cloud Stacks
 
Topic 8: Enhancements and Alternative Architectures
Topic 8: Enhancements and Alternative ArchitecturesTopic 8: Enhancements and Alternative Architectures
Topic 8: Enhancements and Alternative Architectures
 
AOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on itAOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on it
 
Lab 1: Introduction to Amazon EC2 and MPI
Lab 1: Introduction to Amazon EC2 and MPILab 1: Introduction to Amazon EC2 and MPI
Lab 1: Introduction to Amazon EC2 and MPI
 
AOS Lab 6: Scheduling
AOS Lab 6: SchedulingAOS Lab 6: Scheduling
AOS Lab 6: Scheduling
 

Semelhante a Topic 2: Cloud Computing Paradigms

IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing ApplicationIRJET Journal
 
A view of Cloud Computing
A view of Cloud ComputingA view of Cloud Computing
A view of Cloud ComputingAsli Yazagan
 
Various Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingVarious Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingINFOGAIN PUBLICATION
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computingDivyesh Shah
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingIRJET Journal
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computingijceronline
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Find out what's new in SaaS application architecture design (1).pdf
Find out what's new in SaaS application architecture design (1).pdfFind out what's new in SaaS application architecture design (1).pdf
Find out what's new in SaaS application architecture design (1).pdfPraveen Rastogi
 
Find out what's new in SaaS application architecture design.pdf
Find out what's new in SaaS application architecture design.pdfFind out what's new in SaaS application architecture design.pdf
Find out what's new in SaaS application architecture design.pdfPraveen Rastogi
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futuredailytimeupdate.com
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology TrendsSynergisIT
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)Denny Muktar
 
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...Eswar Publications
 

Semelhante a Topic 2: Cloud Computing Paradigms (20)

IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing Application
 
A view of Cloud Computing
A view of Cloud ComputingA view of Cloud Computing
A view of Cloud Computing
 
Various Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingVarious Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud Computing
 
CLOUD COMPUTING ppt
CLOUD COMPUTING pptCLOUD COMPUTING ppt
CLOUD COMPUTING ppt
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Find out what's new in SaaS application architecture design (1).pdf
Find out what's new in SaaS application architecture design (1).pdfFind out what's new in SaaS application architecture design (1).pdf
Find out what's new in SaaS application architecture design (1).pdf
 
Find out what's new in SaaS application architecture design.pdf
Find out what's new in SaaS application architecture design.pdfFind out what's new in SaaS application architecture design.pdf
Find out what's new in SaaS application architecture design.pdf
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology Trends
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
 
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
 

Mais de Zubair Nabi

AOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationAOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationZubair Nabi
 
AOS Lab 11: Virtualization
AOS Lab 11: VirtualizationAOS Lab 11: Virtualization
AOS Lab 11: VirtualizationZubair Nabi
 
AOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondAOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondZubair Nabi
 
AOS Lab 7: Page tables
AOS Lab 7: Page tablesAOS Lab 7: Page tables
AOS Lab 7: Page tablesZubair Nabi
 
AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!Zubair Nabi
 
The Big Data Stack
The Big Data StackThe Big Data Stack
The Big Data StackZubair Nabi
 
Raabta: Low-cost Video Conferencing for the Developing World
Raabta: Low-cost Video Conferencing for the Developing WorldRaabta: Low-cost Video Conferencing for the Developing World
Raabta: Low-cost Video Conferencing for the Developing WorldZubair Nabi
 
Topic 15: Datacenter Design and Networking
Topic 15: Datacenter Design and NetworkingTopic 15: Datacenter Design and Networking
Topic 15: Datacenter Design and NetworkingZubair Nabi
 
Topic 14: Operating Systems and Virtualization
Topic 14: Operating Systems and VirtualizationTopic 14: Operating Systems and Virtualization
Topic 14: Operating Systems and VirtualizationZubair Nabi
 
Lab 5: Interconnecting a Datacenter using Mininet
Lab 5: Interconnecting a Datacenter using MininetLab 5: Interconnecting a Datacenter using Mininet
Lab 5: Interconnecting a Datacenter using MininetZubair Nabi
 
Topic 12: NoSQL in Action
Topic 12: NoSQL in ActionTopic 12: NoSQL in Action
Topic 12: NoSQL in ActionZubair Nabi
 
Topic 10: Taxonomy of Data and Storage
Topic 10: Taxonomy of Data and StorageTopic 10: Taxonomy of Data and Storage
Topic 10: Taxonomy of Data and StorageZubair Nabi
 

Mais de Zubair Nabi (13)

AOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationAOS Lab 12: Network Communication
AOS Lab 12: Network Communication
 
AOS Lab 11: Virtualization
AOS Lab 11: VirtualizationAOS Lab 11: Virtualization
AOS Lab 11: Virtualization
 
AOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondAOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyond
 
AOS Lab 7: Page tables
AOS Lab 7: Page tablesAOS Lab 7: Page tables
AOS Lab 7: Page tables
 
AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!
 
The Big Data Stack
The Big Data StackThe Big Data Stack
The Big Data Stack
 
Raabta: Low-cost Video Conferencing for the Developing World
Raabta: Low-cost Video Conferencing for the Developing WorldRaabta: Low-cost Video Conferencing for the Developing World
Raabta: Low-cost Video Conferencing for the Developing World
 
Topic 15: Datacenter Design and Networking
Topic 15: Datacenter Design and NetworkingTopic 15: Datacenter Design and Networking
Topic 15: Datacenter Design and Networking
 
Topic 14: Operating Systems and Virtualization
Topic 14: Operating Systems and VirtualizationTopic 14: Operating Systems and Virtualization
Topic 14: Operating Systems and Virtualization
 
Lab 5: Interconnecting a Datacenter using Mininet
Lab 5: Interconnecting a Datacenter using MininetLab 5: Interconnecting a Datacenter using Mininet
Lab 5: Interconnecting a Datacenter using Mininet
 
Topic 12: NoSQL in Action
Topic 12: NoSQL in ActionTopic 12: NoSQL in Action
Topic 12: NoSQL in Action
 
Topic 10: Taxonomy of Data and Storage
Topic 10: Taxonomy of Data and StorageTopic 10: Taxonomy of Data and Storage
Topic 10: Taxonomy of Data and Storage
 
Topic 9: MR+
Topic 9: MR+Topic 9: MR+
Topic 9: MR+
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

Topic 2: Cloud Computing Paradigms

  • 1. 2: Cloud Computing Paradigms Zubair Nabi zubair.nabi@itu.edu.pk April 17, 2013 Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 1 / 22
  • 2. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 2 / 22
  • 3. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 3 / 22
  • 4. Cloud computing A realization of utility computing in which computation, storage, and services are offered as a metered service Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
  • 5. Cloud computing A realization of utility computing in which computation, storage, and services are offered as a metered service Encompasses applications delivered as services over the Internet and hardware and software in the datacenters that enable those services Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
  • 6. Cloud computing A realization of utility computing in which computation, storage, and services are offered as a metered service Encompasses applications delivered as services over the Internet and hardware and software in the datacenters that enable those services Software as a Service (SaaS) Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
  • 7. Cloud computing A realization of utility computing in which computation, storage, and services are offered as a metered service Encompasses applications delivered as services over the Internet and hardware and software in the datacenters that enable those services Software as a Service (SaaS) Public Cloud: If available to the public as a pay-as-you-go model, e.g. Amazon Web Services, Google AppEngine, and Microsoft Azure Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
  • 8. Cloud computing A realization of utility computing in which computation, storage, and services are offered as a metered service Encompasses applications delivered as services over the Internet and hardware and software in the datacenters that enable those services Software as a Service (SaaS) Public Cloud: If available to the public as a pay-as-you-go model, e.g. Amazon Web Services, Google AppEngine, and Microsoft Azure Private Cloud: Internal datacenters of an organization that are not publicly accessible Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
  • 9. Advantages Advantages to both service providers and end users Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 10. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 11. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 12. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning No need to build, provision, and maintain a datacenter Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 13. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning No need to build, provision, and maintain a datacenter On the fly scaling Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 14. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning No need to build, provision, and maintain a datacenter On the fly scaling 2 End users: “Anytime, anywhere” access Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 15. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning No need to build, provision, and maintain a datacenter On the fly scaling 2 End users: “Anytime, anywhere” access Share data and collaborate easily Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 16. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning No need to build, provision, and maintain a datacenter On the fly scaling 2 End users: “Anytime, anywhere” access Share data and collaborate easily Safeguard data stored in the infrastructure (debatable) Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 17. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 6 / 22
  • 18. History Phenomenal growth of Web services in late 90s and early 2000s Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
  • 19. History Phenomenal growth of Web services in late 90s and early 2000s Large Internet companies, including Amazon, eBay, Google, Microsoft, Yahoo, etc., already had massive infrastructure Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
  • 20. History Phenomenal growth of Web services in late 90s and early 2000s Large Internet companies, including Amazon, eBay, Google, Microsoft, Yahoo, etc., already had massive infrastructure To keep up with demand, these companies also developed scalable software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.) Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
  • 21. History Phenomenal growth of Web services in late 90s and early 2000s Large Internet companies, including Amazon, eBay, Google, Microsoft, Yahoo, etc., already had massive infrastructure To keep up with demand, these companies also developed scalable software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.) They also acquired the operational expertise to deter potential physical and electronic attacks Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
  • 22. History Phenomenal growth of Web services in late 90s and early 2000s Large Internet companies, including Amazon, eBay, Google, Microsoft, Yahoo, etc., already had massive infrastructure To keep up with demand, these companies also developed scalable software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.) They also acquired the operational expertise to deter potential physical and electronic attacks Therefore, they had already created extremely large datacenters to leverage statistical multiplexing and bulk purchasing of infrastructure Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
  • 23. Incentive for providers Incentives include revenue, leveraging existing investment, defending a franchise, attacking an incumbent, leveraging customer relationships, and becoming a platform Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
  • 24. Incentive for providers Incentives include revenue, leveraging existing investment, defending a franchise, attacking an incumbent, leveraging customer relationships, and becoming a platform Data centers are being established in seemingly arbitrary locations Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
  • 25. Incentive for providers Incentives include revenue, leveraging existing investment, defending a franchise, attacking an incumbent, leveraging customer relationships, and becoming a platform Data centers are being established in seemingly arbitrary locations Reasons for choosing a location include costs of electricity, cooling, labour, property, and taxes Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
  • 26. Incentive for providers Incentives include revenue, leveraging existing investment, defending a franchise, attacking an incumbent, leveraging customer relationships, and becoming a platform Data centers are being established in seemingly arbitrary locations Reasons for choosing a location include costs of electricity, cooling, labour, property, and taxes Cooling and electricity account for 1/3rd of all costs! Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
  • 27. Incentive for providers Incentives include revenue, leveraging existing investment, defending a franchise, attacking an incumbent, leveraging customer relationships, and becoming a platform Data centers are being established in seemingly arbitrary locations Reasons for choosing a location include costs of electricity, cooling, labour, property, and taxes Cooling and electricity account for 1/3rd of all costs! Cheaper to ship data over fiber optic cables than to ship electricity over high-voltage transmission lines Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
  • 28. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 29. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” For instance: Payment model in Web 1.0: Contractual arrangement with a payment processing service such as VeriSign or Authorize.net; making it hard for small businesses to accept credit card payment online Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 30. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” For instance: Payment model in Web 1.0: Contractual arrangement with a payment processing service such as VeriSign or Authorize.net; making it hard for small businesses to accept credit card payment online Web 2.0: With PayPal-like services anyone can sign up and accept credit payments without a contract and a long-term commitment Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 31. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” For instance: Payment model in Web 1.0: Contractual arrangement with a payment processing service such as VeriSign or Authorize.net; making it hard for small businesses to accept credit card payment online Web 2.0: With PayPal-like services anyone can sign up and accept credit payments without a contract and a long-term commitment Another example: Ad revenue model in Web 1.0: Set up a relationship with an ad placement company, such as DoubleClick Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 32. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” For instance: Payment model in Web 1.0: Contractual arrangement with a payment processing service such as VeriSign or Authorize.net; making it hard for small businesses to accept credit card payment online Web 2.0: With PayPal-like services anyone can sign up and accept credit payments without a contract and a long-term commitment Another example: Ad revenue model in Web 1.0: Set up a relationship with an ad placement company, such as DoubleClick Web 2.0: Use Google AdSense Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 33. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” For instance: Payment model in Web 1.0: Contractual arrangement with a payment processing service such as VeriSign or Authorize.net; making it hard for small businesses to accept credit card payment online Web 2.0: With PayPal-like services anyone can sign up and accept credit payments without a contract and a long-term commitment Another example: Ad revenue model in Web 1.0: Set up a relationship with an ad placement company, such as DoubleClick Web 2.0: Use Google AdSense This same model was used by Amazon Web Services in 2006: pay-as-you-go computing with no contract, with the only requirement being a credit card Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 34. New applications Mobile applications: Require high availability and rely on large data sets that are most conveniently hosted in large datacenters Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
  • 35. New applications Mobile applications: Require high availability and rely on large data sets that are most conveniently hosted in large datacenters Parallel batch processing: Analytics jobs that analyze terabytes of data and can take hours to finish can leverage the “cost associativity” of the cloud Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
  • 36. New applications Mobile applications: Require high availability and rely on large data sets that are most conveniently hosted in large datacenters Parallel batch processing: Analytics jobs that analyze terabytes of data and can take hours to finish can leverage the “cost associativity” of the cloud Business analytics: Understanding customers, supply chains, buying habits, ranking, and so on Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
  • 37. New applications Mobile applications: Require high availability and rely on large data sets that are most conveniently hosted in large datacenters Parallel batch processing: Analytics jobs that analyze terabytes of data and can take hours to finish can leverage the “cost associativity” of the cloud Business analytics: Understanding customers, supply chains, buying habits, ranking, and so on Computation offloading: Compute-intensive tasks are offloaded to the cloud. For instance, Matlab, Mathematica, image rendering, 3D animations, etc. Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
  • 38. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 11 / 22
  • 39. Classes of utility computing Every application needs computation, storage, and quite possibly communication Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
  • 40. Classes of utility computing Every application needs computation, storage, and quite possibly communication These resources need to be virtualized to achieve elasticity and the illusion of infinite capacity Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
  • 41. Classes of utility computing Every application needs computation, storage, and quite possibly communication These resources need to be virtualized to achieve elasticity and the illusion of infinite capacity The details of statistical multiplexing and sharing is abstracted away from the programmer Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
  • 42. Classes of utility computing Every application needs computation, storage, and quite possibly communication These resources need to be virtualized to achieve elasticity and the illusion of infinite capacity The details of statistical multiplexing and sharing is abstracted away from the programmer Different utility computing offerings can be distinguished on the basis of the abstraction presented to the programmer Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
  • 43. Bare metal hardware abstraction An instance looks like physical hardware Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 44. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 45. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Employed by Amazon EC2 Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 46. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Employed by Amazon EC2 A very thin API is exposed to request and configure virtualized hardware Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 47. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Employed by Amazon EC2 A very thin API is exposed to request and configure virtualized hardware No bar on the kinds of applications that can be hosted Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 48. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Employed by Amazon EC2 A very thin API is exposed to request and configure virtualized hardware No bar on the kinds of applications that can be hosted Low level virtualization, block-device storage, and IP-level connectivity allow developers to design any application Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 49. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Employed by Amazon EC2 A very thin API is exposed to request and configure virtualized hardware No bar on the kinds of applications that can be hosted Low level virtualization, block-device storage, and IP-level connectivity allow developers to design any application On the downside, scalability and failover are application-dependent Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 50. Domain-specific platform Target traditional web applications Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 51. Domain-specific platform Target traditional web applications Enforce an application structure of clean separation between a stateless computation tier and a stateful storage tier Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 52. Domain-specific platform Target traditional web applications Enforce an application structure of clean separation between a stateless computation tier and a stateful storage tier Employed by Google AppEngine Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 53. Domain-specific platform Target traditional web applications Enforce an application structure of clean separation between a stateless computation tier and a stateful storage tier Employed by Google AppEngine Applications are expected to be request-reply based Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 54. Domain-specific platform Target traditional web applications Enforce an application structure of clean separation between a stateless computation tier and a stateful storage tier Employed by Google AppEngine Applications are expected to be request-reply based In contrast to the bare metal hardware abstraction, enable automatic scaling and high-availability mechanisms Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 55. Domain-specific platform Target traditional web applications Enforce an application structure of clean separation between a stateless computation tier and a stateful storage tier Employed by Google AppEngine Applications are expected to be request-reply based In contrast to the bare metal hardware abstraction, enable automatic scaling and high-availability mechanisms Not suitable for general-purpose computing Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 56. Hybrid Offer a sweet spot between flexibility and programmer convenience Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 57. Hybrid Offer a sweet spot between flexibility and programmer convenience Offered by Microsoft’s Azure Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 58. Hybrid Offer a sweet spot between flexibility and programmer convenience Offered by Microsoft’s Azure Applications are written using .NET libraries and compiled to the Common Language Runtime (A language-independent management environment) Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 59. Hybrid Offer a sweet spot between flexibility and programmer convenience Offered by Microsoft’s Azure Applications are written using .NET libraries and compiled to the Common Language Runtime (A language-independent management environment) Supports general purpose computing Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 60. Hybrid Offer a sweet spot between flexibility and programmer convenience Offered by Microsoft’s Azure Applications are written using .NET libraries and compiled to the Common Language Runtime (A language-independent management environment) Supports general purpose computing Users have control over the choice of language but not the underlying OS or runtime Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 61. Hybrid Offer a sweet spot between flexibility and programmer convenience Offered by Microsoft’s Azure Applications are written using .NET libraries and compiled to the Common Language Runtime (A language-independent management environment) Supports general purpose computing Users have control over the choice of language but not the underlying OS or runtime Provide some degree of automatic failover and scalability but require some help from the developer in the form of declaration of some application properties Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 62. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 16 / 22
  • 63. Elasticity Pay-as-you-go model: Only pay for what you use Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
  • 64. Elasticity Pay-as-you-go model: Only pay for what you use Add or remove resources at a fine grain (such as one server at a time) with minimal lead time Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
  • 65. Elasticity Pay-as-you-go model: Only pay for what you use Add or remove resources at a fine grain (such as one server at a time) with minimal lead time Useful for traffic spikes such as “Black Friday” Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
  • 66. Elasticity Pay-as-you-go model: Only pay for what you use Add or remove resources at a fine grain (such as one server at a time) with minimal lead time Useful for traffic spikes such as “Black Friday” Over time, hardware costs come down and vendors acquire updated hardware. Thus, benefiting the tenant Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
  • 67. Reasons for companies to migrate to the cloud Pay separately per resource: Pay proportional to resource requirements Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
  • 68. Reasons for companies to migrate to the cloud Pay separately per resource: Pay proportional to resource requirements Power, cooling, and physical plant costs: Cost of electricity and cooling already factored in Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
  • 69. Reasons for companies to migrate to the cloud Pay separately per resource: Pay proportional to resource requirements Power, cooling, and physical plant costs: Cost of electricity and cooling already factored in Man-power costs: No need to employ sysadmins Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
  • 70. Reasons for companies to migrate to the cloud Pay separately per resource: Pay proportional to resource requirements Power, cooling, and physical plant costs: Cost of electricity and cooling already factored in Man-power costs: No need to employ sysadmins Operational costs: Low-level upgrades and software patches responsibility of the provider Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
  • 71. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 19 / 22
  • 72. Obstacles 1 Service availability: Possibility of cloud outage Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
  • 73. Obstacles 1 Service availability: Possibility of cloud outage 2 Data lock-in: Reliance on cloud specific APIs Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
  • 74. Obstacles 1 Service availability: Possibility of cloud outage 2 Data lock-in: Reliance on cloud specific APIs 3 Security: Requires strong encrypted storage, VLANs, and network middleboxes (firewalls, etc.) Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
  • 75. Obstacles 1 Service availability: Possibility of cloud outage 2 Data lock-in: Reliance on cloud specific APIs 3 Security: Requires strong encrypted storage, VLANs, and network middleboxes (firewalls, etc.) 4 Data transfer bottlenecks: Moving large amounts of data in and out is expensive Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
  • 76. Obstacles 1 Service availability: Possibility of cloud outage 2 Data lock-in: Reliance on cloud specific APIs 3 Security: Requires strong encrypted storage, VLANs, and network middleboxes (firewalls, etc.) 4 Data transfer bottlenecks: Moving large amounts of data in and out is expensive 5 Performance unpredictability: Resource sharing between applications Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
  • 77. Obstacles (2) 6 Scalable storage: No standard model to arbitrarily scale storage up and down on-demand while ensuring data durability and high availability Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
  • 78. Obstacles (2) 6 Scalable storage: No standard model to arbitrarily scale storage up and down on-demand while ensuring data durability and high availability 7 Bugs in large-scale distributed systems: Hard to debug large-scale applications in full deployment Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
  • 79. Obstacles (2) 6 Scalable storage: No standard model to arbitrarily scale storage up and down on-demand while ensuring data durability and high availability 7 Bugs in large-scale distributed systems: Hard to debug large-scale applications in full deployment 8 Scaling quickly: Automatically scaling while conserving resources and money is an open ended problem Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
  • 80. Obstacles (2) 6 Scalable storage: No standard model to arbitrarily scale storage up and down on-demand while ensuring data durability and high availability 7 Bugs in large-scale distributed systems: Hard to debug large-scale applications in full deployment 8 Scaling quickly: Automatically scaling while conserving resources and money is an open ended problem 9 Reputation fate sharing: Bad behaviour by one tenant can reflect badly on the rest Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
  • 81. Obstacles (2) 6 Scalable storage: No standard model to arbitrarily scale storage up and down on-demand while ensuring data durability and high availability 7 Bugs in large-scale distributed systems: Hard to debug large-scale applications in full deployment 8 Scaling quickly: Automatically scaling while conserving resources and money is an open ended problem 9 Reputation fate sharing: Bad behaviour by one tenant can reflect badly on the rest 10 Software licensing: Gap between pay-as-you-go model and software licensing Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
  • 82. References 1 Above the Clouds: A Berkeley View of Cloud Computing" by Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. Technical Report EECS-2009-28, EECS Department, University of California, Berkeley. Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 22 / 22