cloud computing

54
CLOUD COMPUTING CLOUD COMPUTING

Upload: suchithra-suriya

Post on 05-Jul-2015

76 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: cloud computing

CLOUD COMPUTINGCLOUD COMPUTING

Page 2: cloud computing

Everyone is talking about Everyone is talking about “The Cloud.”“The Cloud.”

But what does it mean?But what does it mean?

Page 3: cloud computing

• Do you have electricity at home?Do you have electricity at home?

• Do u have generator or turbine?Do u have generator or turbine?

Page 4: cloud computing

DO YOU USE?DO YOU USE?

• Servers Servers

• RamRam

Page 5: cloud computing

HOW MANY OF YOU USE HOW MANY OF YOU USE CLOUD COMPUTING?CLOUD COMPUTING?

• FacebookFacebook• GmailGmail• OrkutOrkut• YoutubeYoutube• You are headed for the cloudsYou are headed for the clouds

Page 6: cloud computing

If you use email, or go to a social If you use email, or go to a social network and post photos, access online network and post photos, access online document software, or use your document software, or use your company's hardware/software, you're company's hardware/software, you're probably using the cloudprobably using the cloud

Page 7: cloud computing
Page 8: cloud computing

CLOUD COMPUTING: AN OLD IDEA CLOUD COMPUTING: AN OLD IDEA WHOSE TIME HAS (FINALLY) COMEWHOSE TIME HAS (FINALLY) COME

• John McCarthy opined in the 1960s that John McCarthy opined in the 1960s that “Computation may someday be organized “Computation may someday be organized as a as a public utilitypublic utility..

• Cloud Computing's roots go all the way Cloud Computing's roots go all the way back to the 1950s when scientist back to the 1950s when scientist Herb GroschHerb Grosch (the author of (the author ofGrosch's lawGrosch's law) postulated that the entire world would ) postulated that the entire world would operate on dumb terminals powered by operate on dumb terminals powered by about 15 large data centersabout 15 large data centers

Page 9: cloud computing

• Cloud Computing is an emerging computing Cloud Computing is an emerging computing technology that uses the internet and central technology that uses the internet and central remote servers to maintain data and remote servers to maintain data and applications´.applications´.

• Cloud is a style of computing where scalable Cloud is a style of computing where scalable and elastic IT-related capabilities are and elastic IT-related capabilities are provided as a service to external customers provided as a service to external customers using Internet technologies on a pay per use using Internet technologies on a pay per use model-Gartnermodel-Gartner

Page 10: cloud computing

We all know we can access We all know we can access electricity from the power station electricity from the power station from anywhere, anytime from any from anywhere, anytime from any electrical device as long as we are electrical device as long as we are connected to a power point. connected to a power point.

We can access as much or as little We can access as much or as little as we want, and we only pay for as we want, and we only pay for what we use. Cloud Computing works what we use. Cloud Computing works using the same principle.using the same principle.

Page 11: cloud computing

Cloud Computing can be Cloud Computing can be compared to electricitycompared to electricity

1.On demand1.On demand

2.Broad access2.Broad access

3.measured access (Bill)3.measured access (Bill)

Page 12: cloud computing

• Your phone charger, laptop or any electrical Your phone charger, laptop or any electrical device in your office only accepts electricity device in your office only accepts electricity from your office and nowhere else! Yes! Your from your office and nowhere else! Yes! Your charger, your laptop, your projector even your charger, your laptop, your projector even your toaster in the office are only compatible with toaster in the office are only compatible with the electricity in your office.the electricity in your office.

• If you are using cloud computing, like the If you are using cloud computing, like the electricity grid, if you have a party at your electricity grid, if you have a party at your office and need more power to accommodate office and need more power to accommodate the lights, the stereo, the bar, the band etc, the lights, the stereo, the bar, the band etc, you just switch it on and you only pay for your you just switch it on and you only pay for your usage that night!usage that night!

Page 13: cloud computing

• The actual term “Cloud" borrows from The actual term “Cloud" borrows from telephony in that telecommunications telephony in that telecommunications companies, who until the 1990s primarily companies, who until the 1990s primarily offered dedicated point-to-point data offered dedicated point-to-point data circuits, circuits,

• began offering began offering VIRTUALPRIVATE VIRTUALPRIVATE NETWORKNETWORK (VPN)´ services with (VPN)´ services with comparable quality of service but at a comparable quality of service but at a much lower costmuch lower cost

Page 14: cloud computing

VIRTUAL PRIVATE NETWORKVIRTUAL PRIVATE NETWORK

•   VPN is nothing but a private network, VPN is nothing but a private network, which uses a public network to connect which uses a public network to connect with remote users or siteswith remote users or sites

Page 15: cloud computing

Web Hosting VS Cloud computingWeb Hosting VS Cloud computing

• Web Hosting gives you a fixed server or a Web Hosting gives you a fixed server or a portion of a single server, where cloud portion of a single server, where cloud computing gives you the benefit of many computing gives you the benefit of many servers all working together as one.servers all working together as one.

• Where Cloud Computing really offers Where Cloud Computing really offers benefits is when a Website or application benefits is when a Website or application gets hit with a lot of traffic in a very gets hit with a lot of traffic in a very short amount of time. short amount of time.

• This is also known asThis is also known as “ “SSlash-Dottedlash-Dotted" " oror “ “TThe Digg Effecthe Digg Effect””..

Page 16: cloud computing

Three reasons on why CloudThree reasons on why Cloud

• ScalabilityScalability

• Cost Cost

• InstantInstant

Page 17: cloud computing

TYPES OF CLOUD COMPUTINGTYPES OF CLOUD COMPUTING

Cloud Computing is typically classified in Cloud Computing is typically classified in two ways:two ways:

• Location of the cloud computingLocation of the cloud computing

• Type of services offeredType of services offered

Page 18: cloud computing

BASED ON LOCATIONBASED ON LOCATION

• Public CloudPublic Cloud:: In Public cloud the In Public cloud the computing infrastructure is hosted by computing infrastructure is hosted by the cloud vendor at the vendors the cloud vendor at the vendors premises. The customer has no visibility premises. The customer has no visibility and control over where the computing and control over where the computing infrastructure is hosted. The computing infrastructure is hosted. The computing infrastructure is shared between any infrastructure is shared between any organizationsorganizations..

Page 19: cloud computing

• Private cloudPrivate cloud : : The computing The computing infrastructure is dedicated to a infrastructure is dedicated to a particular organization and not shared particular organization and not shared with other organizations. Some experts with other organizations. Some experts consider that private clouds are not real consider that private clouds are not real examples of cloud computing. Private examples of cloud computing. Private clouds are more expensive and more clouds are more expensive and more secure when compared to public clouds.secure when compared to public clouds.

Page 20: cloud computing

TYPES OF PRIVATE CLOUDTYPES OF PRIVATE CLOUD

• On premiseOn premise

• Externally hosted by a third party Externally hosted by a third party specialised in cloud infrastructurespecialised in cloud infrastructure

Page 21: cloud computing

• Hybrid cloudHybrid cloud :  : Organizations may host Organizations may host critical applications on private clouds critical applications on private clouds and applications with relatively less and applications with relatively less security concerns on the public cloud. security concerns on the public cloud. The usage of both private and public The usage of both private and public clouds together is called hybrid cloudclouds together is called hybrid cloud

Page 22: cloud computing

• Community CloudCommunity Cloud :Sharing of :Sharing of computing infrastructure in between computing infrastructure in between

organizations of the same community. organizations of the same community. For example:- all Government For example:- all Government organizations within the state of organizations within the state of California may share computing California may share computing infrastructure on the cloud to manage infrastructure on the cloud to manage data related to citizens residing in data related to citizens residing in California.California.

Page 23: cloud computing

DIVISION BASED ON SERVICEDIVISION BASED ON SERVICE

Page 24: cloud computing

INFRASTRUTURE AS A INFRASTRUTURE AS A SERVICE(IAAS)SERVICE(IAAS)

It involves offering hardware related It involves offering hardware related services using the principles of cloud services using the principles of cloud

computing. computing.

These could include some kind of These could include some kind of storage services (database or disk storage services (database or disk

storage) or virtual serversstorage) or virtual servers

Page 25: cloud computing

SOFTWARE AS SERVICE(SAAS)SOFTWARE AS SERVICE(SAAS)

• Includes a complete software offering on Includes a complete software offering on the cloud. the cloud.

• Users can access a software application Users can access a software application hosted by the cloud vendor on pay-per-hosted by the cloud vendor on pay-per-use basisuse basis

Page 26: cloud computing

PLATFORM AS A PLATFORM AS A SERVICE(PAAS)SERVICE(PAAS)

• Platform as a Service (PAAS) is a way Platform as a Service (PAAS) is a way to rent hardware, operating systems, to rent hardware, operating systems, storage and network capacity over the storage and network capacity over the Internet. Internet.

• The service delivery model allows the The service delivery model allows the customer to rent virtualized servers customer to rent virtualized servers and associated services for running and associated services for running existing applications or developing and existing applications or developing and testing new ones.testing new ones.

Page 27: cloud computing

When it comes to the Operating System (OS), it is often arguable whether it’s managed by the provider or customer.  Using AWS as an example, AMI (Amazon Machine Image) offers customers several types of Operating Systems such as Windows Server, Linux SUSE, andLinux Red Hat. Although the OS is preloaded, AWS will not maintain or update it.

Page 28: cloud computing
Page 29: cloud computing

Considering a common scenario when Considering a common scenario when you have finished developing a multi-you have finished developing a multi-tier application, you as the developer tier application, you as the developer will need to deploy it to the cloud. will need to deploy it to the cloud. The application will need to be The application will need to be hosted on a Web Server and an hosted on a Web Server and an RDBMS databaseRDBMS database

Page 30: cloud computing

• Preparing Database ServersPreparing Database Servers : : Select the VM Images from the VM Images library. Select the VM Images from the VM Images library. The VM Image will then get provisioned and launched. If DBMS software is not The VM Image will then get provisioned and launched. If DBMS software is not provided, you will need to install DBMS on your own.provided, you will need to install DBMS on your own.

• Preparing Web / Application Servers : Preparing Web / Application Servers : Select VM Images from the library to get Select VM Images from the library to get provisioned and launched. If the web/app server/runtime aren’t installed, you’ll need provisioned and launched. If the web/app server/runtime aren’t installed, you’ll need to install them by yourself.to install them by yourself.

• Provisioning a Database and Its Objects : Provisioning a Database and Its Objects : The next step is about provisioning the The next step is about provisioning the database, including configuring the data files, log files, security, etc. Then you create database, including configuring the data files, log files, security, etc. Then you create the tables and add data to it.the tables and add data to it.

• Deploying Your Application : Deploying Your Application : Next you take the application that you’ve developed and Next you take the application that you’ve developed and deploy it to the Web Server.deploy it to the Web Server.

• Configuring load-balancer : Configuring load-balancer : When you need to host your application on multiple When you need to host your application on multiple instances, you may also need to configure things such as the IP Address for each instances, you may also need to configure things such as the IP Address for each instance and load balancer.instance and load balancer.

• Managing Your VMs and DMBS : Managing Your VMs and DMBS : The final step is about managing the VMs. For The final step is about managing the VMs. For example, when there’s an update or service pack on the OS, the IAAS provider will not example, when there’s an update or service pack on the OS, the IAAS provider will not automatically do it for you. Instead, you may need to do it by yourself.automatically do it for you. Instead, you may need to do it by yourself.

Page 31: cloud computing
Page 32: cloud computing

DATABASE PROVISIONINGDATABASE PROVISIONING

You might need to indicate where (which You might need to indicate where (which region) your virtual DB Server is region) your virtual DB Server is provisioned, but you don’t have to install provisioned, but you don’t have to install a bunch of DBMS software on your own. a bunch of DBMS software on your own. You will need to provision the database, You will need to provision the database, create tables, and add data.create tables, and add data.

Page 33: cloud computing

• If the VM where your application is hosted If the VM where your application is hosted has any hardware issues, the provider should has any hardware issues, the provider should be able to detect the failure and rectify it be able to detect the failure and rectify it immediately to make sure that your immediately to make sure that your application will stay up and running. In application will stay up and running. In Windows Azure, Fabric Controller will be the Windows Azure, Fabric Controller will be the component handling these kinds of issues.component handling these kinds of issues.

• If there are new updates or patches on the If there are new updates or patches on the Operating System, the provider will make Operating System, the provider will make sure that the VM your application sits on is sure that the VM your application sits on is always updated. For example: Windows Azure always updated. For example: Windows Azure uses “Guest OS Version” to differentiate uses “Guest OS Version” to differentiate service updates. Of course you can also service updates. Of course you can also choose to stick to one version or auto-update.choose to stick to one version or auto-update.

Page 34: cloud computing

• PAAS providers indeed take on much PAAS providers indeed take on much more responsibility for your solution more responsibility for your solution than an IAAS provider would.than an IAAS provider would.

Page 35: cloud computing

BASIC REQUIREMENT OF A BASIC REQUIREMENT OF A CLOUDCLOUD

• ScalabilityScalability involves the ability to grow  involves the ability to grow large while functionality remains large while functionality remains undiminished.undiminished.

• ResilienceResilience is the ability to keep going  is the ability to keep going when infrastructure elements fail.when infrastructure elements fail.

• A cloud must support Security A cloud must support Security requirements for applicationsrequirements for applications

Page 36: cloud computing

SCALABILITYSCALABILITY• Scalability is the ability of a system, Scalability is the ability of a system,

network, or process, to handle a growing network, or process, to handle a growing amount of work in a capable manner or amount of work in a capable manner or its ability to be enlarged to its ability to be enlarged to accommodate that growthaccommodate that growth

• The ability for aThe ability for a  DistributedDistributed System System to  to easily expand and contract its resource easily expand and contract its resource pool to accommodate heavier or lighter pool to accommodate heavier or lighter loads or number of inputsloads or number of inputs

Page 37: cloud computing

SCALABILITYSCALABILITY

Page 38: cloud computing

CLOUD COMPUTING CLOUD COMPUTING BENEFITSBENEFITS • Redundant data storageRedundant data storage  - Even if one hard disk fails your - Even if one hard disk fails your

data is safe and will continue to be available automatically on data is safe and will continue to be available automatically on another one;another one;

• Dedicated resourcesDedicated resources - The latest cloud computing technology  - The latest cloud computing technology ensures that your resources are dedicated to you and not ensures that your resources are dedicated to you and not shared to others. This includes RAM and CPU according to the shared to others. This includes RAM and CPU according to the plan you choose.plan you choose.

• No single point of failure -No single point of failure - Each part of the service is Each part of the service is ensured to be redundant and distributed. This means that there ensured to be redundant and distributed. This means that there are no hardware problems, nor software problems from the are no hardware problems, nor software problems from the underlying technology. underlying technology. 

• Resource usage efficiencyResource usage efficiency  - Best options to scale to your - Best options to scale to your usage and naturally pay only what you use. usage and naturally pay only what you use. 

• SecuritySecurity  - Each cloud user can be reliably isolated in his / her - Each cloud user can be reliably isolated in his / her own environment. This ensures that security problems will be own environment. This ensures that security problems will be also isolated in the otherwise shared environment.also isolated in the otherwise shared environment.

Page 39: cloud computing

• Virtualization is the creation of Virtualization is the creation of a a virtualvirtual (rather than actual) version of  (rather than actual) version of something, such as an something, such as an OOperating Systemperating System, , a a serverserver, a storage device or network , a storage device or network resources.resources.

• You probably know a little about virtualization if You probably know a little about virtualization if you have ever divided your you have ever divided your HHard Driveard Drive into  into different partitions. A different partitions. A PPartitionartition is the logical  is the logical division of a hard disk drive to create, in division of a hard disk drive to create, in effect, two separate hard drives.effect, two separate hard drives.

VIRTUALIZATIONVIRTUALIZATION

Page 40: cloud computing

REASONS FOR VIRTUALISATIONREASONS FOR VIRTUALISATION

• n the case of server consolidation, many small physical servers are replaced n the case of server consolidation, many small physical servers are replaced by one larger physical server to increase the utilization of costly hardware by one larger physical server to increase the utilization of costly hardware resources such as CPU. Although hardware is consolidated, typically OSes resources such as CPU. Although hardware is consolidated, typically OSes are not. Instead, each OS running on a physical server becomes converted are not. Instead, each OS running on a physical server becomes converted to a distinct OS running inside a virtual machine. The large server can to a distinct OS running inside a virtual machine. The large server can "host" many such "guest" virtual machines. This is known as Physical-to-"host" many such "guest" virtual machines. This is known as Physical-to-Virtual (P2V) transformation.Virtual (P2V) transformation.

• Consolidating servers can also have the added benefit of reducing energy Consolidating servers can also have the added benefit of reducing energy consumption. A typical server runs at 425Wconsumption. A typical server runs at 425W [3][3] and VMware estimates an  and VMware estimates an average server consolidation ratio of 10:1.average server consolidation ratio of 10:1. [4][4]

• A virtual machine can be more easily controlled and inspected from outside A virtual machine can be more easily controlled and inspected from outside than a physical one, and its configuration is more flexible. This is very than a physical one, and its configuration is more flexible. This is very useful in kernel development and for teaching operating system courses.useful in kernel development and for teaching operating system courses. [5][5]

• A new virtual machine can be provisioned as needed without the need for an A new virtual machine can be provisioned as needed without the need for an up-front hardware purchase.up-front hardware purchase.

• A virtual machine can easily be relocated from one physical machine to A virtual machine can easily be relocated from one physical machine to another as needed. For example, a salesperson going to a customer can copy another as needed. For example, a salesperson going to a customer can copy a virtual machine with the demonstration software to his laptop, without a virtual machine with the demonstration software to his laptop, without the need to transport the physical computer. Likewise, an error inside a the need to transport the physical computer. Likewise, an error inside a virtual machine does not harm the host system, so there is no risk of virtual machine does not harm the host system, so there is no risk of breaking down the OS on the laptop.breaking down the OS on the laptop.

Page 41: cloud computing
Page 42: cloud computing

FEAR OF CLOUDFEAR OF CLOUD

Data security:Data security: Sensitive data processed Sensitive data processed outside the enterprise involves a greater outside the enterprise involves a greater level of risk because outsourced services level of risk because outsourced services bypass the “physical, logical and personnel bypass the “physical, logical and personnel controls” when compared with the control controls” when compared with the control measures imposed on the in-house measures imposed on the in-house programs. programs.

Customers are responsible ultimately to Customers are responsible ultimately to the security of the data even though the the security of the data even though the data are held by the cloud service providedata are held by the cloud service provide

Page 43: cloud computing

RELIABILITY AND VIABLITYRELIABILITY AND VIABLITY

• Reliability is the level of accuracy an Reliability is the level of accuracy an application provides for its intended application provides for its intended services, usually dictated by user services, usually dictated by user documentation or application documentation or application specifications. specifications.

• Reliability is about providing correct Reliability is about providing correct results and handling error detection and results and handling error detection and recovery in order to avoid failures.More recovery in order to avoid failures.More formally,the mean time between failures formally,the mean time between failures (MTBF),that is, the average length of time (MTBF),that is, the average length of time the application runs until a failure the application runs until a failure occurs,defines reliability. occurs,defines reliability.

Page 44: cloud computing

GEOGRAPHICAL AND GEOGRAPHICAL AND JURISDICTIONAL ISSUESJURISDICTIONAL ISSUES

• The Cloud data that are secured in one The Cloud data that are secured in one country are not secured in another country are not secured in another country and the user is not sure about country and the user is not sure about where his data are and most of the where his data are and most of the times it is not disclosed to the user. times it is not disclosed to the user.

• So the user has to enquire the provider So the user has to enquire the provider as to the details of data protection laws as to the details of data protection laws in the relevant jurisdictions.in the relevant jurisdictions.

Page 45: cloud computing

PHISHING ISSUESPHISHING ISSUES

• Phishing is other major issue the cloud Phishing is other major issue the cloud service provider faces. service provider faces.

• In November 2007, a successful phishing In November 2007, a successful phishing attack compromised contact information attack compromised contact information on a number of salesforce.com customers, on a number of salesforce.com customers, which was then used to send highly which was then used to send highly targeted phishing emails to salesforce.com targeted phishing emails to salesforce.com users. users. 

• The phishing breach was cited as an The phishing breach was cited as an example of why the CRM industry needs example of why the CRM industry needs greater security for users against such greater security for users against such threats as spam.threats as spam.

Page 46: cloud computing

TRANSPARENCYTRANSPARENCY

• One of the problems regarding the data One of the problems regarding the data when they are with a cloud service when they are with a cloud service provider is transparency, and this is not provider is transparency, and this is not only with Cloud Computing but anything. only with Cloud Computing but anything. It should not be enough for service It should not be enough for service providers to merely claim that their providers to merely claim that their services are private and secure services are private and secure

Page 47: cloud computing

CRITICISMCRITICISM

• Cloud Computing was simply a trap aimed Cloud Computing was simply a trap aimed at forcing more people to buy into at forcing more people to buy into locked, proprietary systems that would locked, proprietary systems that would cost them more and more over time.cost them more and more over time.

• Transmission of sensitive dataTransmission of sensitive data

Page 48: cloud computing

CLOUD BENEFITS FOR CLOUD BENEFITS FOR BUSINESSBUSINESS

• Firms are still looking for the right Firms are still looking for the right balance between reducing the IT balance between reducing the IT budget and maintaining robust and budget and maintaining robust and efficient systems to support efficient systems to support performance needs.performance needs.

• Most beneficial for start upsMost beneficial for start ups

Page 49: cloud computing

COST AND SAVINGSCOST AND SAVINGS• Here is no question that migrating to a Here is no question that migrating to a

Cloud-Computing model can render Cloud-Computing model can render significant cost savings for an investment significant cost savings for an investment firm. firm. 

• Rather than purchasing costly Rather than purchasing costly infrastructure and building out their own infrastructure and building out their own communications room, firms can communications room, firms can outsource that infrastructure to a third-outsource that infrastructure to a third-party and manage all of their data and party and manage all of their data and applications from a simple Web address applications from a simple Web address on the Interneton the Internet

Page 50: cloud computing

GREEN BENEFITSGREEN BENEFITS

• Using the Internet as a gateway to Using the Internet as a gateway to technology –has a significant environmental technology –has a significant environmental benefit.  benefit. 

• The resources needed to maintain and The resources needed to maintain and manage a traditional communications room manage a traditional communications room are considerable.are considerable.

• Power, cooling and basic energy supply Power, cooling and basic energy supply equipment must be at peak performance at equipment must be at peak performance at all times in order to facilitate maximum all times in order to facilitate maximum uptime for hedge funds and investment uptime for hedge funds and investment firms.With cloud computing, firms don’t firms.With cloud computing, firms don’t need to host internal equipment,thereby need to host internal equipment,thereby saving on energy costssaving on energy costs

Page 51: cloud computing

CLOUD SERVICE PROVIDERSCLOUD SERVICE PROVIDERS

Page 52: cloud computing

SAYING “YES” TO CLOUD SAYING “YES” TO CLOUD COMPUTINGCOMPUTING

• Each firm must rely on its own needs Each firm must rely on its own needs and resources in order to determine and resources in order to determine whether cloud computing is a good fit.  whether cloud computing is a good fit.  

• Firms should assess their individual Firms should assess their individual needs and determine the best strategy needs and determine the best strategy based on their current requirements.based on their current requirements.

Page 53: cloud computing

[email protected]@gmail.com

Page 54: cloud computing

ANY QUESTIONS?ANY QUESTIONS?