5. HOW MANY OF YOU USE
CLOUD COMPUTING?
• Facebook
• Gmail
• Orkut
• Youtube
• You are headed for the clouds
6. If you use email, or go to a social
network and post photos, access online
document software, or use your
company's hardware/software, you're
probably using the cloud
7.
8. CLOUD COMPUTING: AN OLD IDEA
WHOSE TIME HAS (FINALLY) COME
• John McCarthy opined in the 1960s that
“Computation may someday be organized
as a public utility.
• Cloud Computing's roots go all the way
back to the 1950s when scientist
Herb Grosch (the author ofGrosch's law
) postulated that the entire world would
operate on dumb terminals powered by
about 15 large data centers
9. • Cloud Computing is an emerging computing
technology that uses the internet and central
remote servers to maintain data and
applications´.
• Cloud is a style of computing where scalable
and elastic IT-related capabilities are
provided as a service to external customers
using Internet technologies on a pay per use
model-Gartner
10. We all know we can access
electricity from the power station
from anywhere, anytime from any
electrical device as long as we are
connected to a power point.
We can access as much or as little
as we want, and we only pay for
what we use. Cloud Computing works
using the same principle.
11. Cloud Computing can be
compared to electricity
1.On demand
2.Broad access
3.measured access (Bill)
12. • Your phone charger, laptop or any electrical
device in your office only accepts electricity
from your office and nowhere else! Yes! Your
charger, your laptop, your projector even your
toaster in the office are only compatible with
the electricity in your office.
• If you are using cloud computing, like the
electricity grid, if you have a party at your
office and need more power to accommodate
the lights, the stereo, the bar, the band etc,
you just switch it on and you only pay for your
usage that night!
13. • The actual term “Cloud" borrows from
telephony in that telecommunications
companies, who until the 1990s primarily
offered dedicated point-to-point data
circuits,
• began offering VIRTUALPRIVATE
NETWORK (VPN)´ services with
comparable quality of service but at a
much lower cost
14. VIRTUAL PRIVATE NETWORK
• VPN is nothing but a private network,
which uses a public network to connect
with remote users or sites
15. Web Hosting VS Cloud computing
• Web Hosting gives you a fixed server or a
portion of a single server, where cloud
computing gives you the benefit of many
servers all working together as one.
• Where Cloud Computing really offers
benefits is when a Website or application
gets hit with a lot of traffic in a very
short amount of time.
• This is also known as “Slash-Dotted" or “T
he Digg Effect”.
17. TYPES OF CLOUD COMPUTING
Cloud Computing is typically classified in
two ways:
• Location of the cloud computing
• Type of services offered
18. BASED ON LOCATION
• Public Cloud: In Public cloud the
computing infrastructure is hosted by
the cloud vendor at the vendors
premises. The customer has no visibility
and control over where the computing
infrastructure is hosted. The computing
infrastructure is shared between any
organizations.
19. • Private cloud : The computing
infrastructure is dedicated to a
particular organization and not shared
with other organizations. Some experts
consider that private clouds are not real
examples of cloud computing. Private
clouds are more expensive and more
secure when compared to public clouds.
20. TYPES OF PRIVATE CLOUD
• On premise
• Externally hosted by a third party
specialised in cloud infrastructure
21. • Hybrid cloud : Organizations may host
critical applications on private clouds
and applications with relatively less
security concerns on the public cloud.
The usage of both private and public
clouds together is called hybrid cloud
22. • Community Cloud :Sharing of
computing infrastructure in between
organizations of the same community.
For example:- all Government
organizations within the state of
California may share computing
infrastructure on the cloud to manage
data related to citizens residing in
California.
24. INFRASTRUTURE AS A
SERVICE(IAAS)
It involves offering hardware related
services using the principles of cloud
computing.
These could include some kind of
storage services (database or disk
storage) or virtual servers
25. SOFTWARE AS SERVICE(SAAS)
• Includes a complete software offering on
the cloud.
• Users can access a software application
hosted by the cloud vendor on pay-per-
use basis
26. PLATFORM AS A
SERVICE(PAAS)
• Platform as a Service (PAAS) is a way
to rent hardware, operating systems,
storage and network capacity over the
Internet.
• The service delivery model allows the
customer to rent virtualized servers
and associated services for running
existing applications or developing and
testing new ones.
27. When it comes to the Operating
System (OS), it is often arguable
whether it’s managed by the provider
or customer. Using AWS as an
example,
AMI (Amazon Machine Image) offers
customers several types of Operating
Systems such as Windows Server,
Linux SUSE, andLinux Red Hat.
Although the OS is preloaded, AWS
will not maintain or update it.
28.
29. Considering a common scenario when
you have finished developing a multi-
tier application, you as the developer
will need to deploy it to the cloud.
The application will need to be
hosted on a Web Server and an
RDBMS database
30. • Preparing Database Servers : Select the VM Images from the VM Images library.
The VM Image will then get provisioned and launched. If DBMS software is not
provided, you will need to install DBMS on your own.
• Preparing Web / Application Servers : Select VM Images from the library to get
provisioned and launched. If the web/app server/runtime aren’t installed, you’ll need
to install them by yourself.
• Provisioning a Database and Its Objects : The next step is about provisioning the
database, including configuring the data files, log files, security, etc. Then you create
the tables and add data to it.
• Deploying Your Application : Next you take the application that you’ve developed and
deploy it to the Web Server.
• Configuring load-balancer : When you need to host your application on multiple
instances, you may also need to configure things such as the IP Address for each
instance and load balancer.
• Managing Your VMs and DMBS : The final step is about managing the VMs. For
example, when there’s an update or service pack on the OS, the IAAS provider will not
automatically do it for you. Instead, you may need to do it by yourself.
31.
32. DATABASE PROVISIONING
You might need to indicate where (which
region) your virtual DB Server is
provisioned, but you don’t have to install
a bunch of DBMS software on your own.
You will need to provision the database,
create tables, and add data.
33. • If the VM where your application is hosted
has any hardware issues, the provider should
be able to detect the failure and rectify it
immediately to make sure that your
application will stay up and running. In
Windows Azure, Fabric Controller will be the
component handling these kinds of issues.
• If there are new updates or patches on the
Operating System, the provider will make
sure that the VM your application sits on is
always updated. For example: Windows Azure
uses “Guest OS Version” to differentiate
service updates. Of course you can also
choose to stick to one version or auto-update.
34. • PAAS providers indeed take on much
more responsibility for your solution
than an IAAS provider would.
35. BASIC REQUIREMENT OF A
CLOUD
• Scalability involves the ability to grow
large while functionality remains
undiminished.
• Resilience is the ability to keep going
when infrastructure elements fail.
• A cloud must support Security
requirements for applications
36. SCALABILITY
• Scalability is the ability of a system,
network, or process, to handle a growing
amount of work in a capable manner or
its ability to be enlarged to
accommodate that growth
• The ability for a Distributed System to
easily expand and contract its resource
pool to accommodate heavier or lighter
loads or number of inputs
38. CLOUD COMPUTING
BENEFITS
• Redundant data storage - Even if one hard disk fails your
data is safe and will continue to be available automatically on
another one;
• Dedicated resources - The latest cloud computing technology
ensures that your resources are dedicated to you and not
shared to others. This includes RAM and CPU according to the
plan you choose.
• No single point of failure - Each part of the service is
ensured to be redundant and distributed. This means that there
are no hardware problems, nor software problems from the
underlying technology.
• Resource usage efficiency - Best options to scale to your
usage and naturally pay only what you use.
• Security - Each cloud user can be reliably isolated in his / her
own environment. This ensures that security problems will be
also isolated in the otherwise shared environment.
39. VIRTUALIZATION
• Virtualization is the creation of
a virtual (rather than actual) version of
something, such as an Operating System,
a server, a storage device or network
resources.
• You probably know a little about virtualization if
you have ever divided your Hard Drive into
different partitions. A Partition is the logical
division of a hard disk drive to create, in
effect, two separate hard drives.
40. REASONS FOR VIRTUALISATION
• n the case of server consolidation, many small physical servers are replaced
by one larger physical server to increase the utilization of costly hardware
resources such as CPU. Although hardware is consolidated, typically OSes
are not. Instead, each OS running on a physical server becomes converted
to a distinct OS running inside a virtual machine. The large server can
"host" many such "guest" virtual machines. This is known as Physical-to-
Virtual (P2V) transformation.
• Consolidating servers can also have the added benefit of reducing energy
consumption. A typical server runs at 425W[3] and VMware estimates an
average server consolidation ratio of 10:1. [4]
• A virtual machine can be more easily controlled and inspected from outside
than a physical one, and its configuration is more flexible. This is very
useful in kernel development and for teaching operating system courses. [5]
• A new virtual machine can be provisioned as needed without the need for an
up-front hardware purchase.
• A virtual machine can easily be relocated from one physical machine to
another as needed. For example, a salesperson going to a customer can copy
a virtual machine with the demonstration software to his laptop, without
the need to transport the physical computer. Likewise, an error inside a
virtual machine does not harm the host system, so there is no risk of
breaking down the OS on the laptop.
41.
42. FEAR OF CLOUD
Data security: Sensitive data processed
outside the enterprise involves a greater
level of risk because outsourced services
bypass the “physical, logical and personnel
controls” when compared with the control
measures imposed on the in-house
programs.
Customers are responsible ultimately to
the security of the data even though the
data are held by the cloud service provide
43. RELIABILITY AND VIABLITY
• Reliability is the level of accuracy an
application provides for its intended
services, usually dictated by user
documentation or application
specifications.
• Reliability is about providing correct
results and handling error detection and
recovery in order to avoid failures.More
formally,the mean time between failures
(MTBF),that is, the average length of time
the application runs until a failure
occurs,defines reliability.
44. GEOGRAPHICAL AND
JURISDICTIONAL ISSUES
• The Cloud data that are secured in one
country are not secured in another
country and the user is not sure about
where his data are and most of the
times it is not disclosed to the user.
• So the user has to enquire the provider
as to the details of data protection laws
in the relevant jurisdictions.
45. PHISHING ISSUES
• Phishing is other major issue the cloud
service provider faces.
• In November 2007, a successful phishing
attack compromised contact information
on a number of salesforce.com customers,
which was then used to send highly
targeted phishing emails to salesforce.com
users.
• The phishing breach was cited as an
example of why the CRM industry needs
greater security for users against such
threats as spam.
46. TRANSPARENCY
• One of the problems regarding the data
when they are with a cloud service
provider is transparency, and this is not
only with Cloud Computing but anything.
It should not be enough for service
providers to merely claim that their
services are private and secure
47. CRITICISM
• Cloud Computing was simply a trap aimed
at forcing more people to buy into
locked, proprietary systems that would
cost them more and more over time.
• Transmission of sensitive data
48. CLOUD BENEFITS FOR
BUSINESS
• Firms are still looking for the right
balance between reducing the IT
budget and maintaining robust and
efficient systems to support
performance needs.
• Most beneficial for start ups
49. COST AND SAVINGS
• Here is no question that migrating to a
Cloud-Computing model can render
significant cost savings for an investment
firm.
• Rather than purchasing costly
infrastructure and building out their own
communications room, firms can
outsource that infrastructure to a third-
party and manage all of their data and
applications from a simple Web address
on the Internet
50. GREEN BENEFITS
• Using the Internet as a gateway to
technology –has a significant environmental
benefit.
• The resources needed to maintain and
manage a traditional communications room
are considerable.
• Power, cooling and basic energy supply
equipment must be at peak performance at
all times in order to facilitate maximum
uptime for hedge funds and investment
firms.With cloud computing, firms don’t
need to host internal equipment,thereby
saving on energy costs
52. SAYING “YES” TO CLOUD
COMPUTING
• Each firm must rely on its own needs
and resources in order to determine
whether cloud computing is a good fit.
• Firms should assess their individual
needs and determine the best strategy
based on their current requirements.