SlideShare uma empresa Scribd logo
1 de 122
Cloud
Computing
Ms.Ripal Ranpara
Assistant Professor,
Department of Computer Science & Information Technology
Shree M.N. Virani Science College Rajkot
Shree Manibhai Virani and
Smt. Navalben Virani Science
College, Rajkot
(Autonomous)
Affiliated to Saurashtra
University, Rajkot
04/03/17 1
Module:1.1
Overview of Computing Paradigm
What is Computing
• The process of utilizing computer technology to complete a task.
Computing may involve computer hardware and/or software, but must
involve some form of a computer system.
• Computing includes
• designing,
• developing and
• building hardware and software systems;
• processing,
• structuring, and managing various kinds of information;
• doing scientific research on and with computers;
• entertainment media.
Grid computing
• Grid computing involves connecting geographically remote
computers into a single network to create a virtual
supercomputer by combining the computational power of all
computers on grid.
• "the Grid"links together computing resources (PCs,
workstations, servers, storage elements) and provides the
mechanism needed to access them.
• By implementing our proposed Intranet Grid it is very easy to
download multiple files very fast
• No need to worry about the security as we are authenticating
each and every step taking place in our Grid
• In particular user to access the database. Further
implementations could be carried out in the nearest future
Grid computing
WHY GRID COMPUTING?
 40%Mainframes are idle
 90%Unix servers are idle
 95%PC servers are idle
 0-15%Mainframes are idle in peak-hour
 70%PC servers are idle in peak-hour
• Cluster computing is a form of computing in which a group of
computers are linked together so they can act like a single entity.
• It is the technique of linking two or more computers into a
network(Usually through a local area network)in order to take
advantage of the parallel processing power of those computers.
Cluster Computing
Cluster Application
• Google Search Engine
• Earthquake Simulation Software
• Image Rendering
• Weather Forecasting
Application Benefits
• High processing power
• Cost Efficient
• High Availability
• Fault Tolerance
Distributed Computing
• It’s the solution to the problem
where your RAM is too small and
your data are too big and/or too
CPU-intensive to be processed on a
single machine.
• It split a big task into smaller tasks
and execute them on multiple
machines
Advantages Of Distributed
Computing System
• Inherently Distributed applications:
several applications are inherently distributed in nature and require distributed
computing system for their realization
• Information Sharing among Distributed Users:
In a distributed computing system, information generated by one of the users can
be easily and efficiently shared by the users working at other nodes of the
system .The use of distributed computing systems by a group of users to work
cooperatively is known as computer-supported cooperative working (CSCW), or
groupware .
• Resource Sharing:
Information is not the only thing that can be shared in a distributed computing
system. Sharing of software resources such as software libraries and databases as
well as hardware resources such as printers, hard disks, and plotters can also be
done in a very effective way among all the computers and the users of a single
distributed computing system.
Utility Computing
• Utility computing is a service provisioning model in which a service
provider makes computing resources and infrastructure management
available to the customer as needed, and charges them for specific usage
rather than a flat rate.
• Like other types of on-demand computing (such as grid computing), the
utility model seeks to maximize the efficient use of resources and/or
minimize associated costs.
Evaluation of Cloud Computing
Evolution of Cloud Computing
• Solving large
problems with
parallel computing
• Network-based
subscriptions to
applications• Offering computing
resources as a
metered service
• Anytime, anywhere
access to virtualized
IT resources
delivered
dynamically as a
service.
Software as a Service
Utility Computing
Cloud Computing
Grid Computing
Abstraction –> Simplification -> Capability Aggregation
Business Drivers for Cloud
Business growth
• Business growth is one of the top benefits organisations realise as a result of cloud adoption,
with 52% of enterprises reporting increased growth since going cloud (2015 Cloud Enterprise
Report).
2. Efficiency
• Efficiency is an extremely common cloud driver, with 71% of organisations worldwide
ranking it a top area they hope to approve through cloud technology (2015 Cloud Enterprise
Report).
3. Experience
• Next among the business drivers is improving the quality of the customer experience, which
45% of enterprises worldwide rank as a top cloud driver (although that number jumps to 61%
looking at only organisations in the UK and Australia).
4. Assurance
• Finally, there is assurance, which is the idea that data will be more secure in the cloud and
the user will attain better uptime because its solutions are maintained by providers that have
built their businesses around these competencies.
04/03/17 17
04/03/17 19
04/03/17 20
Cloud
Computing
Ms.Ripal Ranpara
Assistant Professor,
Department of Computer Science & Information Technology
Shree M.N. Virani Science College Rajkot
Shree Manibhai Virani and
Smt. Navalben Virani Science
College, Rajkot
(Autonomous)
Affiliated to Saurashtra
University, Rajkot
04/03/17 21
Module:1.2
Introduction to Cloud Computing
Cloud Computing
• Cloud computing refers to applications and services that run on a
distributed network using virtualized resources and accessed by
common Internet protocols and networking standards.
• Cloud computing takes the technology, services, and applications that
are similar to those on the Internet and turns them into a self-service
utility. The use of the word “cloud” makes reference to the two
essential concepts:
Cloud Computing
• Abstraction: Cloud computing abstracts the details of system
implementation from users and developers. Applications run on
physical systems that aren't specified, data is stored in locations that
are unknown, administration of systems is outsourced to others, and
access by users is ubiquitous.
• Virtualization: Cloud computing virtualizes systems by pooling and
sharing resources. Systems and storage can be provisioned as needed
from a centralized infrastructure, costs are assessed on a metered
basis, multi-tenancy is enabled, and resources are scalable with
agility.
04/03/17 24
Cloud Computing ArchitectureCloud Computing Architecture
Basic ConceptsBasic Concepts
There are certain services and models working behind the
scene making the cloud computing feasible and accessible to
end users. Following are the working models for cloud
computing:
1. Deployment Models1. Deployment Models
2. Service Models2. Service Models
Deployment ModelsDeployment Models
Deployment models define the
type of access to the cloud, i.e.,
how the cloud is located? Cloud
can have any of the four types of
access:
•Public,
•Private,
•Hybrid and
•Community.
04/03/17 28
04/03/17 29
PUBLIC CLOUDPUBLIC CLOUD : The Public Cloud allows systems and services to
be easily accessible to the general public. Public cloud may be less
secure because of its openness, e.g., e-mail.
PRIVATE CLOUDPRIVATE CLOUD : The Private Cloud allows systems and services
to be accessible within an organization. It offers increased security
because of its private nature.
PUBLIC CLOUD & PRIVATE CLOUDPUBLIC CLOUD & PRIVATE CLOUD :
04/03/17 30
COMMUNITY CLOUDCOMMUNITY CLOUD : The Community Cloud allows systems and
services to be accessible by group of organizations.
HYBRID CLOUDHYBRID CLOUD : The Hybrid Cloud is mixture of public and private
cloud. However, the critical activities are performed using private cloud
while the non-critical activities are performed using public cloud.
COMMUNITY CLOUD & HYBRID CLOUDCOMMUNITY CLOUD & HYBRID CLOUD
The NIST model
• The United States government is a major consumer of computer services and,
therefore, one of the major users of cloud computing networks.
• The NIST model originally did not require a cloud to use virtualization to pool
resources, nor did it absolutely require that a cloud support multi-tenancy in the
earliest definitions of cloud computing.Multi-tenancy is the sharing of resources
among two or more clients
04/03/17 32
04/03/17 33
04/03/17 34
History of Cloud Computing
04/03/17 35
04/03/17 36
04/03/17 37
04/03/17 38
04/03/17 39
04/03/17 40
04/03/17 41
04/03/17 42
Characteristics of Cloud Computing
• Have access to low cost power
• Leverage renewable power source
• Be near abundant water
• Be sited where high-speed network backbone connections
can be made
• Keep land costs modest and occupation unobtrusive Obtain
tax breaks
• Optimize the overall system latency
04/03/17 43
Benefits of cloud computing
• On-demand self-service
• Broad network access
• Resource pooling
• Rapid elasticity
• Measured service
• Lower costs
• Ease of utilization
• Quality of Service
• Reliability
04/03/17 44
• Outsourced IT
management
• Simplified maintenance
and upgrade
• Low Barrier to Entry
04/03/17 45
04/03/17 46
Communication Protocols
• Cloud computing arises from services available over the Internet
communicating using the standard Internet protocol suite underpinned
by the HTTP and HTTPS transfer protocols.
• In order to engage in inter process communication (IPC) processes,
many client/server protocols have been applied to distributed
networking over the years. Various forms of RPC (Remote Procedure
Call) implementations (including DCOM, Java RMI, and CORBA)
04/03/17 47
Assessing the Role of Open
Standards
• The cloud computing industry is
working with these architectural
standards:
• Platform virtualization of
resources
• Service-oriented architecture
•Deployment of open-source
software
•Standardized Web services
•Autonomic systems
•Grid computing
•Web-application frameworks
•These standards help to enable different business models that cloud computing
vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications,
and utility computing.
•These businesses require open standards so that data is both portable and universally
accessible.
Infrastructure as a Service (IaaS)
• Infrastructure as a Service (IaaS) is a
way of delivering Cloud Computing
infrastructure – servers, storage, network
and operating systems – as an on-
demand service. Rather than purchasing
servers, software, datacenter space or
network equipment, clients instead buy
those resources as a fully outsourced
service on demand Iaas provides the
following
● Servers- compute, machines
● Storage
● Network
● Operating system
04/03/17 50
04/03/17 51
Introduction to virtualization
• Virtualization is a technology to run multiple same or
different operating systems which is completely
isolated from each other.
• Ex: Run both Windows and Linux on the same
machine
04/03/17 52
Run multiple virtual computers on one physical box.
• Desktop
• Server
• Data Center
• Cloud
04/03/17 53
How it is different from dual
boot?
• Both OSes run simultaneously
04/03/17 54
Types of Virtualization
• Server Virtualization
• Desktop Virtualization
• Application Virtualization
• Memory
• Storage
• Data
• Network
04/03/17 55
What is Hypervisor
• Hypervisor is a software layer sits between Hardware
and OSes which will interact with hardware and
resources and provide an interface to share the
available resources to Virtual containers
04/03/17 56
Virtualization Benefits
• Redundancy
• Legacy hardware (Inheritance)
• Migration
• Centralized management
04/03/17 57
virtual machine (VM)
• A virtual machine (VM) is an operating system (OS) or
application environment that is installed on software, which
imitates dedicated hardware. The end user has the same
experience on a virtual machine as they would have on
dedicated hardware.
• Specialized software, called a hypervisor, emulates the
PC client or server's CPU, memory, hard disk, network and
other hardware resources completely, enabling virtual
machines to share the resources.
04/03/17 58
Storage as a service
• Online file storage centers or cloud storage
providers allow you to safely upload your
files to the Internet.
iCloud is a service provided by Apple
• 5GB storage space is free of cost
• Once the iCloud is used you can share your
stored data on any of your different Apple
devices
• Aceess to all files, music, calendar, email
• Only iOS 5 has iCloud installed04/03/17 59
04/03/17 60
Free storage Options
Business Benefits
• With cloud storage, there's no need for CDs, external hard drives, or
localized servers
• Data is quickly and automatically updated in the cloud and available
for your retrieval whenever you need it
• With no need for physical, on-site storage space, you can have a
smaller workspace, less equipment to buy, and fewer IT employees to
maintain your equipment and manage your data
• IT staff's can spend more time to focusing on other important tasks to
help your business growth.
04/03/17 62
Eucalyptus Open-Source Private
Cloud
• Eucalyptus is a Linux-based open-source software architecture that
implements efficiency-enhancing private and hybrid clouds within
an enterprise’s existing IT infrastructure.
Eucalyptus is an acronym for “Elastic Utility Computing
Architecture for Linking Your Programs to Useful Systems.”
A Eucalyptus private cloud is deployed across an enterprise’s “on
premise” data center infrastructure and is accessed by users over
enterprise intranet. Thus, sensitive data remains entirely secure from
external intrusion behind the enterprise firewall.
04/03/17 63
Infrastructure Security
• 1.Network Level security
• 2.Host level security
• 3.Application level security
04/03/17 64
Infrastructure Security - The
Network Level
• There are four significant risk factors in this use case:
• 1.Ensuring the confidentiality and integrity of organization's data-
in-transit to and from a public cloud provider;
• 2. Ensuring proper access control (authentication, authorization, and
auditing) to whatever resources are used at the public cloud
provider;
• 3. Ensuring the availability of the Internet-facing resources in a
public cloud that are being used by an organization, or have been
assigned to an organization by public cloud providers;
• 4.Replacing the established model of network zones and tiers with
domains.
04/03/17 65
Infrastructure Security - The
Host Level
• The host security responsibilities in SaaS and PaaS
services are transferred to the provider of cloud
services. IaaS customers are primarily responsible for
securing the hosts provisioned in the cloud
(virtualization software security, customer guest OS
or virtual server security).
04/03/17 66
Infrastructure Security - The
Application Level
• The level is responsible for managing
• Application-level security threats;
• End user security;
• SaaS application security;
• PaaS application security;
• Customer-deployed application security
• IaaS application security
• Public cloud security limitations
04/03/17 67
04/03/17 68
Understanding Cloud Security
• Your risks in any cloud deployment are dependent upon the particular
cloud service model chosen and the type of cloud on which you
deploy your applications.
• In order to evaluate your risks, you need to perform the following
analysis:
• 1. Determine which resources (data, services, or applications) you are
planning to move to the cloud.
• 2. Determine the sensitivity of the resource to risk.
• 3. Determine the risk associated with the particular cloud type for a
resource.
04/03/17 69
04/03/17 70
04/03/17 71
Securing Data and Data piracy
 Securing data sent to, received from, and stored in the cloud is the
single largest security concern that most organizations should have
with cloud computing.
 As with any WAN traffic, you must assume that any data can be
intercepted and modified. That's why, as a matter of course, traffic to a
cloud service provider and stored off-premises is encrypted.
•These are the key mechanisms for protecting data mechanisms:
Access control
Auditing
Authentication
Authorization
04/03/17 72
Cloud Computing Landscape
Applications
Storage
Computing
Development
platform
Gartner predicts revenue of USD 131billion in 2013
Who uses cloud computing?
Why do customers use the
cloud?
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
Customers’ biggest concerns
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
Customers’ biggest concerns
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
Customers’ biggest concerns
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
Customers’ biggest concerns
KPMG International’s 2012 Global Cloud Provider Survey (n=179)
Control and jurisdictional issues
On premise
App
VM
Server
Storage
Network
On premise
(hosted)
App
VM
Server
Storage
Network
IaaS
App
VM
Server
Storage
Network
PaaS
App
Services
Server
Storage
Network
SaaS
App
Services
Server
Storage
Network
Organization
has control
Organization shares
control with vendor
Vendor
has control
Image reproduced from Cloud security and privacy, 2009, Mather et al.
CLOUD COMPUTING SECURITY
AND PRIVACY ISSUES
• There are numerous security issues for cloud computing as it
encompasses many technologies including
• networks,
• databases,
• operating systems,
• virtualization,
• resource scheduling,
• transaction management,
• load balancing,
• concurrency control and memory management.
04/03/17 81
Access management & Access
Control
• there are six specific areas of the cloud computing environment
where equipment and software require substantial security attention
These six areas are:
• (1) security of data at rest,
• (2) security of data in transit,
• (3) authentication of users/applications/ processes,
• (4) robust separation between data belonging to different customers,
• (5)cloud legal and regulatory issues, and (6) incident response.
04/03/17 82
Launch an Application with AWS
Elastic Beanstalk
04/03/17 83
04/03/17 84
04/03/17 85
04/03/17 86
04/03/17 87
04/03/17 88
04/03/17 89
04/03/17 90
04/03/17 91
04/03/17 92
04/03/17 93
04/03/17 94
CLOUD CONTRACTING
MODELS
• Licensing Agreements Versus Services Agreements
– Summary of Terms of a License Agreement
– Summary of Terms o
– Value of Using a Service Agreement in Cloud Arrangement s
a Service Agreement.
• On-Line Agreements Versus Standard Contracts
• The Importance of Privacy Policies Terms and Conditions
• Risk Allocation and Limitations of Liability
04/03/17 95
96Cloud Computing Represented as a Stack of Service Offering Categories1
04/03/17 97
Cloud and SOA
• SOA is an approach to architecture that is intended to
promote flexibility and scalability.
• SOA is defined by what a service is. Services are defined by
the following characteristics
• ● Explicit, implementation-independent interfaces
• ● Loosely bound
• ● Invoked through communication protocol
• ● encapsulate reusable business functions
04/03/17 98
SOAARCHITECTURE
• Cloud Infrastructure has many service
components.
• Services can be divided into four domains
• Application Services
• Information Services
• Common IT services
• Infrastructure Services
04/03/17 99
Cloud and SOA-SOA Life Cycle
• SOA lifecycle resembles “traditional” application lifecycle, but
introduces new terminology.
• SOA in terms of life cycle requires a start in the SOA model Phase by
gathering business requirement and designing their business
processes.
• Once they have been optimized the business processes, they
implement it by combining new and existing services.
• These assets are then deployed into a secure and integrated
environment for integrating people , processes and information
04/03/17
100
SOA based Cloud Infrastructure
Steps
• Enterprises that intend to harness cloud
computing must consider the following steps
• ● Analysis and Strategy
• ● Planning
• ● Implementation
• ● Value-driven(Feedback)
04/03/17 101
Cloud Computing
And Management
Cloud Computing

Internet-based computing, where different services(servers,
storage and applications) are delivered to an organization's
computers and devices through the Internet.
How Cloud Computing
Works ??

Clouds use a network layer to connect users’ end point
devices, like computers or smart phones, to resources that
are centralized in a data centre.

Users access the data centre via a company network or the
internet or both. Clouds can also be accessed from any
location, allowing mobile workers to access their business
systems on demand.
Cloud Management

Management of cloud computing products and
services.

Software and technologies designed for operating
and monitoring applications, data and services
residing in the cloud.
Cloud Computing Services

Software as a Service(SaaS)

Platform as a service(PaaS)

Infrastructure as a Service(IaaS)
Cloud Computing Deployment
Models

Public (Services provided to general public)

Private (for single organization or any third
party,maintenace cost is high)

Hybrid (mix of public and private cloud
services,gives businesses greater flexibility and
more data depolyment options)
Benefits of Cloud
Management

Global management

Remote office and distributed storage management

Information Access for disaster recovery

Cost reduction

Real time reporting

Easy Upgrades

Encrypted information

Compliance management

Ease of implementation
What is Virtualization?
• Multiple OSes on a single machine
– Giving an illusion that each OS is running on real HW
– Virtual Machine Monitor (VMM)
• Another layer of kernel to virtualize multiple OSes
• Also called “hypervisor”
–An OS as a supervisor is no more HW-dictator!
111/30
04/03/17 112
Why Virtualization? (2/6)
• Flexible VM relocation
– “Live VM migration”
• Flexible VM relocation with near-zero downtime
– Flexible load balancing
VMVM
VMVM
VMVM
CPU
CPU
CPU
CPU
113/30
Why Virtualization? (3/6)
• Flexible VM relocation
– “Live VM migration”
• Flexible VM relocation with near-zero downtime
– High availability
VMVM
SW or HW maintenance
(upgrade or fix)
114/30
Why Virtualization? (6/6)
• Other benefits
– Strong security monitoring
• Security monitoring outside OSes
– Ease of deployment
• Virtual appliance
– A bundle of OS and applications
– Flexible testing and debugging
• Building distributed environments on a single
machine
• Kernel development and debugging
• VM-based recording and replaying
115/30
Virtualization & Cloud Computing
• Virtualized data centers
Virtualization 1.x: Near term
Virtualization 2.0: Emerging
Virtualization 3.0: Future
Virtualization 3.0
The fully virtualized datacenter
for cloud services
2013+
Virtualization 1.x
Virtualization 2.0
2009
출처 : IDC 2010 report
116/30
IBM – Cloud Transformation

Bluemix is a cloud platform as a service (PaaS)
developed by IBM for building, running, and
managing apps and services.

SoftLayer, an IBM Company, provides cloud
infrastructure as a service from a growing number of
data centers and network points of presence around
the world
Case Study
Need:

A company wanted to help diabetes
patients more easily by sharing
accurate, up-to-date medical
information with physicians .
Solution
Working with IBM,the company created
a mobile app, supported by IBM
Bluemix and
SoftLayer technologies, that captures
and aggregates data directly from other
medical devices and health tools.
Benefit

The virtualized IBM architecture cuts ongoing
operational costs by 30 percent with a flexible
platform, while physicians and diabetics have
clearer insight into patient health, encouraging
better care options.
yy
• ggf
yy
• ggf

Mais conteúdo relacionado

Mais procurados

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud Computing
Jithin Parakka
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
Ashish Kumar
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
purplesea
 

Mais procurados (20)

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Application of Cloud Computing
Application of Cloud ComputingApplication of Cloud Computing
Application of Cloud Computing
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
Data-Intensive Technologies for Cloud Computing
Data-Intensive Technologies for CloudComputingData-Intensive Technologies for CloudComputing
Data-Intensive Technologies for Cloud Computing
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud Computing
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
VTU 6th Sem Elective CSE - Module 3 cloud computing
VTU 6th Sem Elective CSE - Module 3 cloud computingVTU 6th Sem Elective CSE - Module 3 cloud computing
VTU 6th Sem Elective CSE - Module 3 cloud computing
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebula
 
Introduction to Microsoft Azure Cloud
Introduction to Microsoft Azure CloudIntroduction to Microsoft Azure Cloud
Introduction to Microsoft Azure Cloud
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud service management
Cloud service managementCloud service management
Cloud service management
 
Load balancing in cloud
Load balancing in cloudLoad balancing in cloud
Load balancing in cloud
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Processor allocation in Distributed Systems
Processor allocation in Distributed SystemsProcessor allocation in Distributed Systems
Processor allocation in Distributed Systems
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptx
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdution
 

Semelhante a Cloud computing

Semelhante a Cloud computing (20)

Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 
Cloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliCloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr Ali
 
Introduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewIntroduction to Cloud Computing, Overview
Introduction to Cloud Computing, Overview
 
Cloud-mod1-chap1.pptx
Cloud-mod1-chap1.pptxCloud-mod1-chap1.pptx
Cloud-mod1-chap1.pptx
 
pp01.pptx
pp01.pptxpp01.pptx
pp01.pptx
 
Cloud and Grid Computing
Cloud and Grid ComputingCloud and Grid Computing
Cloud and Grid Computing
 
Cloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, CentricCloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, Centric
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
cloud computing.ppt
cloud computing.pptcloud computing.ppt
cloud computing.ppt
 
cloud computing
 cloud computing cloud computing
cloud computing
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
 
lecture5_4.pptx
lecture5_4.pptxlecture5_4.pptx
lecture5_4.pptx
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
cloudintro-lec018.1.ppt
cloudintro-lec018.1.pptcloudintro-lec018.1.ppt
cloudintro-lec018.1.ppt
 
final-unit-i-cc cloud computing-2022.pdf
final-unit-i-cc cloud computing-2022.pdffinal-unit-i-cc cloud computing-2022.pdf
final-unit-i-cc cloud computing-2022.pdf
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
 
Cloud+Computing-1.pptx
Cloud+Computing-1.pptxCloud+Computing-1.pptx
Cloud+Computing-1.pptx
 
Cloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxCloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptx
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 

Mais de Ripal Ranpara (6)

Python final ppt
Python final pptPython final ppt
Python final ppt
 
Moodle
MoodleMoodle
Moodle
 
System Development Life Cycle:SDLC
System Development Life Cycle:SDLCSystem Development Life Cycle:SDLC
System Development Life Cycle:SDLC
 
How to develop Project
How to develop ProjectHow to develop Project
How to develop Project
 
Microsoft visio
Microsoft visioMicrosoft visio
Microsoft visio
 
Speech recognition system
Speech recognition systemSpeech recognition system
Speech recognition system
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Cloud computing

  • 1. Cloud Computing Ms.Ripal Ranpara Assistant Professor, Department of Computer Science & Information Technology Shree M.N. Virani Science College Rajkot Shree Manibhai Virani and Smt. Navalben Virani Science College, Rajkot (Autonomous) Affiliated to Saurashtra University, Rajkot 04/03/17 1 Module:1.1 Overview of Computing Paradigm
  • 2. What is Computing • The process of utilizing computer technology to complete a task. Computing may involve computer hardware and/or software, but must involve some form of a computer system. • Computing includes • designing, • developing and • building hardware and software systems; • processing, • structuring, and managing various kinds of information; • doing scientific research on and with computers; • entertainment media.
  • 3. Grid computing • Grid computing involves connecting geographically remote computers into a single network to create a virtual supercomputer by combining the computational power of all computers on grid.
  • 4. • "the Grid"links together computing resources (PCs, workstations, servers, storage elements) and provides the mechanism needed to access them. • By implementing our proposed Intranet Grid it is very easy to download multiple files very fast • No need to worry about the security as we are authenticating each and every step taking place in our Grid • In particular user to access the database. Further implementations could be carried out in the nearest future Grid computing
  • 5. WHY GRID COMPUTING?  40%Mainframes are idle  90%Unix servers are idle  95%PC servers are idle  0-15%Mainframes are idle in peak-hour  70%PC servers are idle in peak-hour
  • 6. • Cluster computing is a form of computing in which a group of computers are linked together so they can act like a single entity. • It is the technique of linking two or more computers into a network(Usually through a local area network)in order to take advantage of the parallel processing power of those computers. Cluster Computing
  • 7. Cluster Application • Google Search Engine • Earthquake Simulation Software • Image Rendering • Weather Forecasting Application Benefits • High processing power • Cost Efficient • High Availability • Fault Tolerance
  • 8.
  • 9. Distributed Computing • It’s the solution to the problem where your RAM is too small and your data are too big and/or too CPU-intensive to be processed on a single machine. • It split a big task into smaller tasks and execute them on multiple machines
  • 10. Advantages Of Distributed Computing System • Inherently Distributed applications: several applications are inherently distributed in nature and require distributed computing system for their realization • Information Sharing among Distributed Users: In a distributed computing system, information generated by one of the users can be easily and efficiently shared by the users working at other nodes of the system .The use of distributed computing systems by a group of users to work cooperatively is known as computer-supported cooperative working (CSCW), or groupware . • Resource Sharing: Information is not the only thing that can be shared in a distributed computing system. Sharing of software resources such as software libraries and databases as well as hardware resources such as printers, hard disks, and plotters can also be done in a very effective way among all the computers and the users of a single distributed computing system.
  • 11. Utility Computing • Utility computing is a service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed, and charges them for specific usage rather than a flat rate. • Like other types of on-demand computing (such as grid computing), the utility model seeks to maximize the efficient use of resources and/or minimize associated costs.
  • 12.
  • 13.
  • 14. Evaluation of Cloud Computing
  • 15. Evolution of Cloud Computing • Solving large problems with parallel computing • Network-based subscriptions to applications• Offering computing resources as a metered service • Anytime, anywhere access to virtualized IT resources delivered dynamically as a service. Software as a Service Utility Computing Cloud Computing Grid Computing Abstraction –> Simplification -> Capability Aggregation
  • 16. Business Drivers for Cloud Business growth • Business growth is one of the top benefits organisations realise as a result of cloud adoption, with 52% of enterprises reporting increased growth since going cloud (2015 Cloud Enterprise Report). 2. Efficiency • Efficiency is an extremely common cloud driver, with 71% of organisations worldwide ranking it a top area they hope to approve through cloud technology (2015 Cloud Enterprise Report). 3. Experience • Next among the business drivers is improving the quality of the customer experience, which 45% of enterprises worldwide rank as a top cloud driver (although that number jumps to 61% looking at only organisations in the UK and Australia). 4. Assurance • Finally, there is assurance, which is the idea that data will be more secure in the cloud and the user will attain better uptime because its solutions are maintained by providers that have built their businesses around these competencies.
  • 18.
  • 21. Cloud Computing Ms.Ripal Ranpara Assistant Professor, Department of Computer Science & Information Technology Shree M.N. Virani Science College Rajkot Shree Manibhai Virani and Smt. Navalben Virani Science College, Rajkot (Autonomous) Affiliated to Saurashtra University, Rajkot 04/03/17 21 Module:1.2 Introduction to Cloud Computing
  • 22. Cloud Computing • Cloud computing refers to applications and services that run on a distributed network using virtualized resources and accessed by common Internet protocols and networking standards. • Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. The use of the word “cloud” makes reference to the two essential concepts:
  • 23. Cloud Computing • Abstraction: Cloud computing abstracts the details of system implementation from users and developers. Applications run on physical systems that aren't specified, data is stored in locations that are unknown, administration of systems is outsourced to others, and access by users is ubiquitous. • Virtualization: Cloud computing virtualizes systems by pooling and sharing resources. Systems and storage can be provisioned as needed from a centralized infrastructure, costs are assessed on a metered basis, multi-tenancy is enabled, and resources are scalable with agility.
  • 25. Cloud Computing ArchitectureCloud Computing Architecture
  • 26. Basic ConceptsBasic Concepts There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing: 1. Deployment Models1. Deployment Models 2. Service Models2. Service Models
  • 27. Deployment ModelsDeployment Models Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access: •Public, •Private, •Hybrid and •Community.
  • 29. 04/03/17 29 PUBLIC CLOUDPUBLIC CLOUD : The Public Cloud allows systems and services to be easily accessible to the general public. Public cloud may be less secure because of its openness, e.g., e-mail. PRIVATE CLOUDPRIVATE CLOUD : The Private Cloud allows systems and services to be accessible within an organization. It offers increased security because of its private nature. PUBLIC CLOUD & PRIVATE CLOUDPUBLIC CLOUD & PRIVATE CLOUD :
  • 30. 04/03/17 30 COMMUNITY CLOUDCOMMUNITY CLOUD : The Community Cloud allows systems and services to be accessible by group of organizations. HYBRID CLOUDHYBRID CLOUD : The Hybrid Cloud is mixture of public and private cloud. However, the critical activities are performed using private cloud while the non-critical activities are performed using public cloud. COMMUNITY CLOUD & HYBRID CLOUDCOMMUNITY CLOUD & HYBRID CLOUD
  • 31.
  • 32. The NIST model • The United States government is a major consumer of computer services and, therefore, one of the major users of cloud computing networks. • The NIST model originally did not require a cloud to use virtualization to pool resources, nor did it absolutely require that a cloud support multi-tenancy in the earliest definitions of cloud computing.Multi-tenancy is the sharing of resources among two or more clients 04/03/17 32
  • 34. 04/03/17 34 History of Cloud Computing
  • 43. Characteristics of Cloud Computing • Have access to low cost power • Leverage renewable power source • Be near abundant water • Be sited where high-speed network backbone connections can be made • Keep land costs modest and occupation unobtrusive Obtain tax breaks • Optimize the overall system latency 04/03/17 43
  • 44. Benefits of cloud computing • On-demand self-service • Broad network access • Resource pooling • Rapid elasticity • Measured service • Lower costs • Ease of utilization • Quality of Service • Reliability 04/03/17 44 • Outsourced IT management • Simplified maintenance and upgrade • Low Barrier to Entry
  • 47. Communication Protocols • Cloud computing arises from services available over the Internet communicating using the standard Internet protocol suite underpinned by the HTTP and HTTPS transfer protocols. • In order to engage in inter process communication (IPC) processes, many client/server protocols have been applied to distributed networking over the years. Various forms of RPC (Remote Procedure Call) implementations (including DCOM, Java RMI, and CORBA) 04/03/17 47
  • 48. Assessing the Role of Open Standards • The cloud computing industry is working with these architectural standards: • Platform virtualization of resources • Service-oriented architecture •Deployment of open-source software •Standardized Web services •Autonomic systems •Grid computing •Web-application frameworks •These standards help to enable different business models that cloud computing vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications, and utility computing. •These businesses require open standards so that data is both portable and universally accessible.
  • 49.
  • 50. Infrastructure as a Service (IaaS) • Infrastructure as a Service (IaaS) is a way of delivering Cloud Computing infrastructure – servers, storage, network and operating systems – as an on- demand service. Rather than purchasing servers, software, datacenter space or network equipment, clients instead buy those resources as a fully outsourced service on demand Iaas provides the following ● Servers- compute, machines ● Storage ● Network ● Operating system 04/03/17 50
  • 52. Introduction to virtualization • Virtualization is a technology to run multiple same or different operating systems which is completely isolated from each other. • Ex: Run both Windows and Linux on the same machine 04/03/17 52
  • 53. Run multiple virtual computers on one physical box. • Desktop • Server • Data Center • Cloud 04/03/17 53
  • 54. How it is different from dual boot? • Both OSes run simultaneously 04/03/17 54
  • 55. Types of Virtualization • Server Virtualization • Desktop Virtualization • Application Virtualization • Memory • Storage • Data • Network 04/03/17 55
  • 56. What is Hypervisor • Hypervisor is a software layer sits between Hardware and OSes which will interact with hardware and resources and provide an interface to share the available resources to Virtual containers 04/03/17 56
  • 57. Virtualization Benefits • Redundancy • Legacy hardware (Inheritance) • Migration • Centralized management 04/03/17 57
  • 58. virtual machine (VM) • A virtual machine (VM) is an operating system (OS) or application environment that is installed on software, which imitates dedicated hardware. The end user has the same experience on a virtual machine as they would have on dedicated hardware. • Specialized software, called a hypervisor, emulates the PC client or server's CPU, memory, hard disk, network and other hardware resources completely, enabling virtual machines to share the resources. 04/03/17 58
  • 59. Storage as a service • Online file storage centers or cloud storage providers allow you to safely upload your files to the Internet. iCloud is a service provided by Apple • 5GB storage space is free of cost • Once the iCloud is used you can share your stored data on any of your different Apple devices • Aceess to all files, music, calendar, email • Only iOS 5 has iCloud installed04/03/17 59
  • 62. Business Benefits • With cloud storage, there's no need for CDs, external hard drives, or localized servers • Data is quickly and automatically updated in the cloud and available for your retrieval whenever you need it • With no need for physical, on-site storage space, you can have a smaller workspace, less equipment to buy, and fewer IT employees to maintain your equipment and manage your data • IT staff's can spend more time to focusing on other important tasks to help your business growth. 04/03/17 62
  • 63. Eucalyptus Open-Source Private Cloud • Eucalyptus is a Linux-based open-source software architecture that implements efficiency-enhancing private and hybrid clouds within an enterprise’s existing IT infrastructure. Eucalyptus is an acronym for “Elastic Utility Computing Architecture for Linking Your Programs to Useful Systems.” A Eucalyptus private cloud is deployed across an enterprise’s “on premise” data center infrastructure and is accessed by users over enterprise intranet. Thus, sensitive data remains entirely secure from external intrusion behind the enterprise firewall. 04/03/17 63
  • 64. Infrastructure Security • 1.Network Level security • 2.Host level security • 3.Application level security 04/03/17 64
  • 65. Infrastructure Security - The Network Level • There are four significant risk factors in this use case: • 1.Ensuring the confidentiality and integrity of organization's data- in-transit to and from a public cloud provider; • 2. Ensuring proper access control (authentication, authorization, and auditing) to whatever resources are used at the public cloud provider; • 3. Ensuring the availability of the Internet-facing resources in a public cloud that are being used by an organization, or have been assigned to an organization by public cloud providers; • 4.Replacing the established model of network zones and tiers with domains. 04/03/17 65
  • 66. Infrastructure Security - The Host Level • The host security responsibilities in SaaS and PaaS services are transferred to the provider of cloud services. IaaS customers are primarily responsible for securing the hosts provisioned in the cloud (virtualization software security, customer guest OS or virtual server security). 04/03/17 66
  • 67. Infrastructure Security - The Application Level • The level is responsible for managing • Application-level security threats; • End user security; • SaaS application security; • PaaS application security; • Customer-deployed application security • IaaS application security • Public cloud security limitations 04/03/17 67
  • 69. Understanding Cloud Security • Your risks in any cloud deployment are dependent upon the particular cloud service model chosen and the type of cloud on which you deploy your applications. • In order to evaluate your risks, you need to perform the following analysis: • 1. Determine which resources (data, services, or applications) you are planning to move to the cloud. • 2. Determine the sensitivity of the resource to risk. • 3. Determine the risk associated with the particular cloud type for a resource. 04/03/17 69
  • 72. Securing Data and Data piracy  Securing data sent to, received from, and stored in the cloud is the single largest security concern that most organizations should have with cloud computing.  As with any WAN traffic, you must assume that any data can be intercepted and modified. That's why, as a matter of course, traffic to a cloud service provider and stored off-premises is encrypted. •These are the key mechanisms for protecting data mechanisms: Access control Auditing Authentication Authorization 04/03/17 72
  • 74. Who uses cloud computing?
  • 75. Why do customers use the cloud? KPMG International’s 2012 Global Cloud Provider Survey (n=179)
  • 76. Customers’ biggest concerns KPMG International’s 2012 Global Cloud Provider Survey (n=179)
  • 77. Customers’ biggest concerns KPMG International’s 2012 Global Cloud Provider Survey (n=179)
  • 78. Customers’ biggest concerns KPMG International’s 2012 Global Cloud Provider Survey (n=179)
  • 79. Customers’ biggest concerns KPMG International’s 2012 Global Cloud Provider Survey (n=179)
  • 80. Control and jurisdictional issues On premise App VM Server Storage Network On premise (hosted) App VM Server Storage Network IaaS App VM Server Storage Network PaaS App Services Server Storage Network SaaS App Services Server Storage Network Organization has control Organization shares control with vendor Vendor has control Image reproduced from Cloud security and privacy, 2009, Mather et al.
  • 81. CLOUD COMPUTING SECURITY AND PRIVACY ISSUES • There are numerous security issues for cloud computing as it encompasses many technologies including • networks, • databases, • operating systems, • virtualization, • resource scheduling, • transaction management, • load balancing, • concurrency control and memory management. 04/03/17 81
  • 82. Access management & Access Control • there are six specific areas of the cloud computing environment where equipment and software require substantial security attention These six areas are: • (1) security of data at rest, • (2) security of data in transit, • (3) authentication of users/applications/ processes, • (4) robust separation between data belonging to different customers, • (5)cloud legal and regulatory issues, and (6) incident response. 04/03/17 82
  • 83. Launch an Application with AWS Elastic Beanstalk 04/03/17 83
  • 95. CLOUD CONTRACTING MODELS • Licensing Agreements Versus Services Agreements – Summary of Terms of a License Agreement – Summary of Terms o – Value of Using a Service Agreement in Cloud Arrangement s a Service Agreement. • On-Line Agreements Versus Standard Contracts • The Importance of Privacy Policies Terms and Conditions • Risk Allocation and Limitations of Liability 04/03/17 95
  • 96. 96Cloud Computing Represented as a Stack of Service Offering Categories1
  • 98. Cloud and SOA • SOA is an approach to architecture that is intended to promote flexibility and scalability. • SOA is defined by what a service is. Services are defined by the following characteristics • ● Explicit, implementation-independent interfaces • ● Loosely bound • ● Invoked through communication protocol • ● encapsulate reusable business functions 04/03/17 98
  • 99. SOAARCHITECTURE • Cloud Infrastructure has many service components. • Services can be divided into four domains • Application Services • Information Services • Common IT services • Infrastructure Services 04/03/17 99
  • 100. Cloud and SOA-SOA Life Cycle • SOA lifecycle resembles “traditional” application lifecycle, but introduces new terminology. • SOA in terms of life cycle requires a start in the SOA model Phase by gathering business requirement and designing their business processes. • Once they have been optimized the business processes, they implement it by combining new and existing services. • These assets are then deployed into a secure and integrated environment for integrating people , processes and information 04/03/17 100
  • 101. SOA based Cloud Infrastructure Steps • Enterprises that intend to harness cloud computing must consider the following steps • ● Analysis and Strategy • ● Planning • ● Implementation • ● Value-driven(Feedback) 04/03/17 101
  • 103. Cloud Computing  Internet-based computing, where different services(servers, storage and applications) are delivered to an organization's computers and devices through the Internet.
  • 104. How Cloud Computing Works ??  Clouds use a network layer to connect users’ end point devices, like computers or smart phones, to resources that are centralized in a data centre.  Users access the data centre via a company network or the internet or both. Clouds can also be accessed from any location, allowing mobile workers to access their business systems on demand.
  • 105.
  • 106. Cloud Management  Management of cloud computing products and services.  Software and technologies designed for operating and monitoring applications, data and services residing in the cloud.
  • 107.
  • 108. Cloud Computing Services  Software as a Service(SaaS)  Platform as a service(PaaS)  Infrastructure as a Service(IaaS)
  • 109. Cloud Computing Deployment Models  Public (Services provided to general public)  Private (for single organization or any third party,maintenace cost is high)  Hybrid (mix of public and private cloud services,gives businesses greater flexibility and more data depolyment options)
  • 110. Benefits of Cloud Management  Global management  Remote office and distributed storage management  Information Access for disaster recovery  Cost reduction  Real time reporting  Easy Upgrades  Encrypted information  Compliance management  Ease of implementation
  • 111. What is Virtualization? • Multiple OSes on a single machine – Giving an illusion that each OS is running on real HW – Virtual Machine Monitor (VMM) • Another layer of kernel to virtualize multiple OSes • Also called “hypervisor” –An OS as a supervisor is no more HW-dictator! 111/30
  • 113. Why Virtualization? (2/6) • Flexible VM relocation – “Live VM migration” • Flexible VM relocation with near-zero downtime – Flexible load balancing VMVM VMVM VMVM CPU CPU CPU CPU 113/30
  • 114. Why Virtualization? (3/6) • Flexible VM relocation – “Live VM migration” • Flexible VM relocation with near-zero downtime – High availability VMVM SW or HW maintenance (upgrade or fix) 114/30
  • 115. Why Virtualization? (6/6) • Other benefits – Strong security monitoring • Security monitoring outside OSes – Ease of deployment • Virtual appliance – A bundle of OS and applications – Flexible testing and debugging • Building distributed environments on a single machine • Kernel development and debugging • VM-based recording and replaying 115/30
  • 116. Virtualization & Cloud Computing • Virtualized data centers Virtualization 1.x: Near term Virtualization 2.0: Emerging Virtualization 3.0: Future Virtualization 3.0 The fully virtualized datacenter for cloud services 2013+ Virtualization 1.x Virtualization 2.0 2009 출처 : IDC 2010 report 116/30
  • 117. IBM – Cloud Transformation  Bluemix is a cloud platform as a service (PaaS) developed by IBM for building, running, and managing apps and services.  SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world
  • 118. Case Study Need:  A company wanted to help diabetes patients more easily by sharing accurate, up-to-date medical information with physicians .
  • 119. Solution Working with IBM,the company created a mobile app, supported by IBM Bluemix and SoftLayer technologies, that captures and aggregates data directly from other medical devices and health tools.
  • 120. Benefit  The virtualized IBM architecture cuts ongoing operational costs by 30 percent with a flexible platform, while physicians and diabetics have clearer insight into patient health, encouraging better care options.

Notas do Editor

  1. Grid computing - combination of computer resources from multiple administrative domains applied to a common task Utility computing focus is on the business model on which providing the computing services are based. , as a metered service similar to a traditional public utility (such as electricity, water, natural gas, or telephone network). Utility computing merely means "Pay and Use", with regards to computing power. Cloud computing is a broader concept than utility computing and relates to the underlying architecture in which the services are designed Saas - relates to software applications which are not purchased and hosted locally but licensed from an organization which also hosts the software. The applications are then accessed over the Web.
  2. Many sectors including healthcare, government, finance, retail and automobile use the cloud for file sharing, web, mobile, HPC, CRM, ERP, data storage, analytics etc. Lot of sensitive information stored, processed and transferred on the cloud Educational records, IRB IP, Health Finance Government Games, Entertainment etc.
  3. Why would customers save money? What is speed to adoption? Low upfront investment, startup can grow as required Why is licensing easier?
  4. Who is responsible for data loss or other issues in the cloud? Organizational control decreases from private to public, and IaaS to SaaS Liability depends on SLA and contract Organization has accountability irrespective of control and liability In a virtual machine environment, multiple operating systems can run on a single piece of hardware A hypervisor, also called Virtual Machine Monitor (VMM), is computer software/hardware platform virtualization software that allows multiple operating systems to run on a host computer concurrently