Unit 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 76

CLOUD COMPUTING

UNIT – 1

By Tulasi Vemu.
INTRODUCTION TO CLOUD
COMPUTING

⦿ Objective Of the Course Cloud computing

⦿ What Is Cloud

⦿ Introduction about Cloud Computing

Date :17-08-2020
COURSE OBJECTIVES
1. Importance of the Cloud computing in real
world.

2. Applications that can be integrated using


cloud

3. Evaluate Cloud based applications

4. security Issues in the Cloud

5. Managing the cloud Services.


WHAT IS CLOUD COMPUTING

Cloud Computing is a model for enabling


ubiquitous, convenient , on-demand n/w
access to a shared pool of configurable
computing resources such as,
network/servers/storage/application and
services, that can be rapidly provisioned
and released with minimal management
effort or service provider interaction

XasS – Anything as a Service


ESSENTIAL CHARECTERISTICS OF
CLOUD COMPUTING

⦿ On-Demand self services

⦿ Broad Network access

⦿ Resource Pooling

⦿ Rapid Elasticity

⦿ Measured services
CLOUD DEPLOYMENT MODELS
⦿ Private Cloud

⦿ Public Cloud

⦿ Hybrid Cloud

⦿ Community Cloud

19-08-2020
PUBLIC CLOUD
⦿ Public cloud is an IT model where on-demand
computing services and infrastructure are
managed by a third-party provider and
shared with multiple organizations using the
public Internet.

⦿ Examples: Google Cloud, Microsoft Azure,


Amazon EC2, IBM Cloud.. etc
PUBLIC CLOUD…
⦿ Advantages
High Availability
Reduced Cost
Hassel-free infrastructure Management
24/7 uptime
⦿ Disadvantages
Compromised Reliability
Data security and privacy concerns
The lack of bespoke service
PRIVATE CLOUD

The private cloud is defined as computing


services offered either over the Internet or a
private internal network and only to selected
users instead of the general public. Also
called an internal or corporate cloud.
PRIVATE CLOUD…
⦿ Advantages
◼ Flexible Development
◼ High Scalability
◼ High Security/privacy and reliability

⦿ Disadvantages
◼ Cost required for hardware and infrastructure
◼ Cost required for software and staff training
COMMUNITY CLOUD

A community cloud is a cloud service model


that provides a cloud computing solution to a
limited number of individuals or
organizations that is governed, managed and
secured commonly by all the participating
organizations or a third party managed
service provider.
COMMUNITY CLOUD…
⦿ Advantages
◼ Cost reduction
◼ Improved security, privacy and reliability
◼ Ease of data sharing and collaboration

⦿ Disadvantages
◼ High cost if compared to a public deployment
model
◼ Sharing of fixed storage and bandwidth capacity
◼ It is not widespread so far
HYBRID CLOUD

a hybrid cloud encompasses the best features


of the above-mentioned deployment models
— public, private and community ones. It
allows companies to mix and match the
facets of all three types that best suit their
requirements.
HYBRID CLOUD…
⦿ Advantages
◼ Improved security and privacy
◼ Enhanced scalability and flexibility
◼ Reasonable price
⦿ Disadvantages
◼ hybrid deployment model only makes sense if
companies can split their data into
mission-critical and non-sensitive.
INTRODUCTION TO CLOUD TECHNOLOGIES
(CLOUD SERVICE MODELS)

⦿ IaaS (Infrastructure as a Service)

⦿ PaaS (Platform as a Service)

⦿ SaaS (Software as a Service)

Date: 20-08-2020
INFRASTRUCTURE AS SERVICE

The capability provided to the customer is


to provision processing, storage, network
and fundamental computing resources
where the consumer is able to deploy it
and run an arbitrary software that
includes OS and other Applications

Ex: Amazon EC2, HP Cloud Matrix, IBM


Cloud.. Etc.
INFRASTRUCTURE AS SERVICE
PLATFORM AS A SERVICE

The capability provided to the customer is to


deploy on to the cloud infrastructure
consumer-created or acquired applications
created using programming languages and
tools supported by the provider .

Ex: Windows Azure, google App Engine, and


Hadoop.. Etc.
PLATFORM AS A SERVICE
SOFTWARE AS A SERVICE

The capability provided to the consumer is to


use provider’s applications running on a
cloud infrastructure. The applications are
accessible from various client devices
through a thin client interface such as web
browser.

Ex: Salesforce.com for CRM Application,


Google Docs For Document Sharing,
Gmail, Yahoo Mail and Hotmail for web
e-mail services… etc.
SOFTWARE AS A SERVICE
BUSINESS DRIVERS FOR CLOUD
COMPUTING

⦿ Scalability

⦿ Cost

⦿ Agility

⦿ Innovation
STORAGE AS A SERVICE
(AMAZON STORAGE SERVICES)

⦿ Amazon simple storage Service (S3): An Object


Store

⦿ Amazon simple DB: A Key-Value Store

⦿ Amazon Relational Database Service (RDS):


MySQL Instance

Date: 21-08-2020
AMAZON SIMPLE STORAGE SERVICE
(S3) – AN OBJECT STORE

⦿ Accessing S3

⦿ Getting Started With S3

⦿ Organizing Data in S3 Buckets

⦿ S3 Administration
ACCESSING S3

⦿ AWS Console: via


http://aws.amazon.com/console

⦿ Amazon’s RESTful API: provides familiar


Operations Such as GET, PUT, DELETE and
HEAD

⦿ SDK’s for Ruby and Other Languages :


Amazon provides Libraries and SDK’s for
various programming Languages that abstract
these operations
AWS CONSOLE
GETTING STARTED WITH S3
1. Signup with http://aws.amazon.com/s3/ - You
will get AWS ACCESS KEY (USER ID) and AWS
secret Key(Password)
2. Sign in to the AWS Management Console for S3
at https://console.aws.amazon.com/s3/home.
3. Create a bucket giving a name and geographical
location where it can be stored.
4. Click the Upload button and follow the
instructions to upload files.
5. The photos or other files are now safely backed
up to S3 and available for sharing with a URL if
the right permissions are provided.
CREATING A BUCKET
UPLOADING THE OBJECTS
ORGANIZING DATA IN S3
⦿ Buckets
⦿ Objects
⦿ Keys

Files are called objects in S3.


Objects are referred to with keys.

S3 objects can be up to 5 Terabytes in size and there are no limits on the number of
objects that can be stored.

All objects in S3 must be stored in a bucket.

Buckets provide a way to keep related objects in one place and separate them from
others.

There can be up to 100 buckets per account and an unlimited number of objects in a
bucket.

Date: 24-08-2020
S3 ADMINISTRATION

⦿ SECURITY
◼ Access Control
◼ Turn on Loggings for bucket
⦿ Data Protection
◼ Reduced redundancy Storage (RRS)
◼ Versioning
◼ Regions

⦿ Large Objects & Multi-Parts Uploads


ACCESS CONTROL
AMAZON SIMPLE DB – A KEY VALUE STORE
Date:26-08-20
⦿ Data Organization & Access:
Data in SDB is organized into domains. Each item in a domain has a
unique key that must be provided during creation. Each item can have up
to 256 attributes, which are name-value pairs. In terms of the relational
model, for each row, the primary key translates to the item name and
the column names and values for that row translate to the attribute
name-value pairs.

⦿ SDB Availability & Administration:


SDB has a number of features to increase availability and
reliability. Data stored in SDB is automatically replicated across
different geographies for high availability. It also automatically adds
compute resources in proportion to the request rate and
automatically indexes all fields in the dataset for efficient access.
AMAZON RELATIONAL DATABASE
SERVICE (RDS) – MY SQL INSTANCE
COMPUTE AS A SERVICE:
AMAZON ELASTIC COMPUTECLOUD
(EC2)

⦿ Overview Of Amazon EC2


⦿ Accessing EC2 using AWS Console
⦿ Accessing EC2 Using Command Line Tools
⦿ EC2 Computational Resources
⦿ EC2 Storage Resources
⦿ EC2 Networking Resources
OVERVIEW OF AMAZON EC2
Amazon EC2 allows enterprises to define a
virtual server, with virtual storage and virtual
networking.
As the computational needs of an enterprise
can vary greatly, some applications may be
compute-intensive, and other applications may stress
storage.
Certain enterprise applications may need
certain software environments and other applications
may need computational clusters to run efficiently.
Networking requirements may also vary
greatly.
This diversity in the compute hardware, with
automatic maintenance and ability to handle the
scale, makes EC2 a unique platform.
AMAZON EC2 CONSOLE
CREATING AN EC2 INSTANCE USING
THE AWS CONSOLE.
THE EC2 INSTANCE WIZARD
PARAMETERS THAT CAN BE ENABLED FOR A
SIMPLE EC2 INSTANCE.
ACCESSING EC2 USING
COMMAND LINE TOOLS
Date: 27-08-2020
⦿ Download tools

⦿ Set environment variables (e.g., location of


JRE)

⦿ Set security environment (e.g., get


certificate)

⦿ Set region
ACCESSING EC2 USING
COMMAND LINE TOOLS…
1. Download Tools:
The EC2 command line utilities can be
downloaded from Amazon EC2 API Tools as a Zip
file.
They are written in Java, and hence will run
on Linux, Unix, and Windows if the appropriate
JRE is available.
In order to use them simply unpack the file,
and then set appropriate environment variables,
depending upon the operating system being
used.
These environment variables can also be set
as parameters to the command.
ACCESSING EC2 USING
COMMAND LINE TOOLS…
2. Set environment variables (e.g., location of JRE):

For Linux:
⦿ $export JAVA_HOME=PATHNAME
⦿ $export EC2_TOOLS=TOOLS_PATHNAME
⦿ $export PATH=$PATH:$EC2_HOME/bin

For Windows:
⦿ C:\>SET JAVA_HOME=PATHNAME
⦿ C:\>SET EC2_TOOLS=TOOLS_PATHNAME
⦿ C:\>SET PATH=%PATH%,%EC2_HOME%\bin

1. The first command sets the environment variable that specifies the
directory in which the Java runtime resides.
2. The second command specifies the directory where the EC2 tools
reside;
3. The third command sets the executable path to include the directory
where the EC2 command utilities are present.
ACCESSING EC2 USING
COMMAND LINE TOOLS…
3. Set security environment (e.g., get certificate):

Certificate can be generated by clicking on the “Account” link shown


in AWS Console.
By clicking on the “Security Credentials” link that is displayed, and
following the given instructions to create a new certificate.
The certificate files should be downloaded to a .ec2 directory in the
home directory on Linux/Unix, and C:\ec2 on Windows, without changing
their names.
The following commands are to be executed to set up the
Environment.

$export EC2-CERT=~/.ec2/f1.pem (Linux Command)

C:\> set EC2-CERT=~/.ec2/f1.pem (windows Command)

Here the name of the certificate file is “f1.pem”


ACCESSING EC2 USING
COMMAND LINE TOOLS…
4. Set Regions:

each region represents an AWS data center, and AWS pricing


varies by region.
The command ec2-describe-regions can be issued at this
point to test the installation of the EC2 command tools and list
the available regions.
The default region used is the US-East region “us-east-1”
with service endpoint URL
http://ec2.us-east-1.amazonaws.com, but can be set to any
specific end point using the following command, where
ENDPOINT_URL is formed from the region name as illustrated for
the “us-east-1”.

$export EC2-URL=https://<ENDPOINT_URL> (Linux Command)

C:\> set EC2-URL =https://<ENDPOINT_URL> (windows Command)


EC2 COMPUTATIONAL RESOURCES

⦿ Computing resources:

⦿ Software: AMI(Amazon Machine Image)

⦿ Regions and Availability Zones

⦿ Load Balancing and Scaling


◼ Elastic Load Balancer
EC2 STANDARD INSTANCE TYPES
EC2 STORAGE RESOURCES

⦿ Amazon S3: Highly available object store

⦿ Elastic Block Service: permanent block


storage

⦿ Instance Storage: transient block storage

Date: 02-09-2020
EC2 STORAGE RESOURCES
EC2 NETWORKING RESOURCES

⦿ Private and public IP addresses per instance

⦿ Elastic IP addresses not associated with any


instance

⦿ Route 53 DNS that allows simple URLs (e..g.


www.mywebsite.com)

⦿ Security groups for networking security


policies
PRIVATE AND PUBLIC IP ADDRESSES
PER INSTANCE
⦿ Instance addresses: Each EC2 instance has
two IP addresses associated with it – the
public IP address and the private IP address.
The private IP address and DNS name can be
resolved only within the EC2 cloud.
⦿ For communication between EC2 instances,
the internal IP addresses are most efficient,
for the messages then pass entirely within
the Amazon network.
⦿ The public IP address and DNS name can be
used for communication outside the Amazon
cloud.
ELASTIC IP ADDRESSES
⦿ Elastic IP addresses: These IP addresses are
independent of any instance, but are
associated with a particular Amazon EC2
account and can be dynamically assigned to
any instance.
⦿ Upon failure of one EC2 instance, the Elastic
IP address can be dynamically assigned to
Failed EC2 instance.
⦿ Unlike instance IP addresses, Elastic IP
addresses are not automatically allocated;
they have to be generated when needed.
ROUTE 53
⦿ Enterprises may desire to publish a URL of
the form http://www.myenterprise.com for
EC2 instances.
⦿ This is not possible by default, since the EC2
instances are inside the amazon.com domain.
⦿ Route 53 is a DNS server that can be used to
associate an Elastic IP address or public IP
address with a name of the form
www.myenterprise.com.
SECURITY GROUPS
⦿ For networking security, it is common to
define network security policies that restrict
the ports through which any machine can be
accessed, or the IP addresses that can access
a server. The same can be achieved for EC2
instances using security groups.
⦿ The default security group when creating an
EC2 instance allows the instance to connect
to any outside IP address but disallows
incoming connections.
SIMPLE EC2 EXAMPLE:
SETTING UP A WEB SERVER
Date :03-09-2020
The process is broken down into four steps:

i. Selecting the AMI for the instance

ii. Creating the EC2 instance and installing the web


server

iii. Creating an EBS volume for data, such as HTML


files and so on

iv. Setting up networking and access rules.


SELECTING THE AMI
CREATING THE EXAMPLE EC2
INSTANCE
(i) generate a key pair that provides access to the EC2 servers that are
created and

(ii) create a security group that will be associated with the instance and
specify the networking access rules.

For Linux:
⦿ $ export EC2-PRIVATE-KEY=~/.ec2/f2.pem
⦿ $ ec2addgrp "Web Server" –d "Security Group for Web Servers"
⦿ $ ec2run ami-74f0061d –b dev/sda1=::false –k f2.pem –g “Web Server”

For Windows:
⦿ C:\> set EC2-PRIVATE-KEY =C:\.ec2\f2.pem
⦿ C:\> ec2addgrp "Web Server" –d "Security Group for Web Servers"
⦿ C:\> ec2run ami-74f0061d –b "xvda=::false" –k f2.pem –g "Web Server"
ATTACHING AN EBS VOLUME
⦿ Since the HTML pages to be served from the web
portal need to be persistent, it is required to create
an EBS volume for holding the HTML pages that are to
be served by the web server. EBS volumes can be
created from the EC2 console by clicking on the
“Volumes” link.

⦿ “Attach Volume” button brings up the “Attach


Volume” screen, which has drop-down menus for the
EC2 instance to be used, as well as the device name.

⦿ After making the appropriate selections, clicking the


“Attach” button will virtually attach the volume to
the selected instance.
CREATING A NEW EBS VOLUME
ATTACHING AN EBS VOLUME TO AN
EC2 INSTANCE.
ALLOWING EXTERNAL ACCESS TO
THE WEB SERVER
HP CLOUDSYSTEM MATRIX
Date: 04-09-2020
⦿ HP CloudSystem Automation Suite

CloudSystem Matrix: A product that enables IaaS as a


private cloud solution as well as basic application
deployment and monitoring.

CloudSystem Enterprise: A product that enables IaaS as a


private or hybrid cloud solution; supports a single services
view, heterogeneous infrastructure, bursting and bridging
to a public cloud if desired, and advanced life cycle
management.

CloudSystem Service Provider: A product that enables public


or hosted private cloud; meant for service providers to
provide SaaS; includes aggregation and management of
those services.
HP CLOUDSYSTEM MATRIX..

CloudSystem Matrix is an HP product that


combines server, network, storage and
management components in an integrated
offering.

The inbuilt management provides a web-based


graphical user interface, as well as an
exposed web service API that provides
infrastructure as a service (IaaS) capabilities.
BASIC PLATFORM FEATURES
1. Service Catalog.

2. Consumer Portal (self-service interface)

3. One or more shared resource pools

4. Service template design and authoring tools

5. Administrator Portal containing tools for


group, resource capacity, usage and
maintenance management.
BASIC PLATFORM FEATURES
⦿ Service Catalog.
◼ The consumer can browse the Service Catalog,
which lists the available infrastructure offerings.
The catalog entries serve as a blueprint template
for new service creation by the consumer.
⦿ Consumer Portal.
◼ This is used to create new service with the help
of self-service interface, to select the desired
catalog entry and nominate the desired shared
resource pool to be used as a source of capacity
for the new service.
BASIC PLATFORM FEATURES
⦿ The shared resource pool:
◼ consists of a collection of similar resources, such
as storage LUNs, and virtual machines.
Subsequently, the consumer uses the Consumer
Portal to perform on-going management
operations over the lifetime of the service.
◼ This could be simple activities including re-boot
or console access to their environment, or more
advanced activities such as adjusting the
resources assigned to the service – expanding to
meeting demand growth, as well as reducing
resources for savings during low utilization
periods.
BASIC PLATFORM FEATURES
⦿ Service Template Designer Portal
◼ Entries in the Service Catalog need to be
authored, tested and published with tools to
support the process. This is done via the Service
Template Designer Portal and the Workflow
Designer Portal.
⦿ Administrator Portal
◼ This is to manage the groups of consumers, setting
policies associated with their catalog access, and
resource pool consumption.
◼ Administrator tools also need to support capacity
planning associated both with demand growth as well
as the impacts of maintenance schedules.
OVERVIEW OF CLOUD SYSTEM
MATRIX
⦿ CloudSystem Matrix treats all resources in a
uniform manner; i.e., as objects with
attributes that are grouped into resource
pools.
⦿ For servers, the virtual servers can have
attributes such as the speed of the CPU, the
OS available, and the cost. Similar virtual
servers can be grouped into resource pools of
servers.
OVERVIEW OF CLOUD SYSTEM
MATRIX
⦿ Virtual storage devices can also have
attributes such as their speed, RAID
configuration, and cost per byte and can also
be grouped into resource pools.
⦿ Network configuration allows specification of
various policies such as the IP address
assignment policy.
⦿ During service instantiation, resources are
allocated from the appropriate pools based
upon user specification.
CELL – AS – A - SERVICE

⦿ The Cells-as-a-Service prototype (simply


referred to as Cells for short) was built to
support multi-tenanted services for complex
services. In any complex realistic service,
there are various components such as a
ticketing service, billing service, logging
service, etc. that may be required to be
hosted on an infrastructure service.

Date: 09-09-2020
CELL – AS – A - SERVICE

A unique feature of the Cells prototype is its


ability to define templates for such complex
systems and enable easy deployment. Cells
has been evolving, and currently supports
many of the properties mentioned
previously.
INTRODUCTION TO
CELLS-AS-A-SERVICE
⦿ Cell is an abstraction for a set of virtual
machines interconnected to deliver a
service.
⦿ A Service Template (ST) is a template
describing the infrastructure (including both
software and hardware) that is required to
realize a service. Since it is a template,
various parameters, such as the number of
servers needed, may not be specified.
⦿ A Service User (SU) is the consumer of a
service
INTRODUCTION TO
CELLS-AS-A-SERVICE

⦿ Service Provider (SP): The person who


acquires the resources to host the service,
and then configures and runs the service is a
Service Provider (SP).

⦿ Compute Service Provider (CSP): The entity


from which the service provider acquires the
resources by supplying the Service Template
is called the Compute Service Provider (CSP).
AN EXAMPLE CELL.
EXAMPLE
CSP (AWS)

SP (MOUNIKA)(Internal CLOUD) +
CELL STEMPLate

SU (TULASI) (CELL)

You might also like