0% found this document useful (0 votes)
25 views

CloudComputing Unit 1

ccs335

Uploaded by

Selvaruba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
25 views

CloudComputing Unit 1

ccs335

Uploaded by

Selvaruba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 51
and Infrastructure Cloud Architecture Models IF Syllabus Cloud Architecture : System Models for Distributed and Cloud Computing - NIST Cloud Computing Reference Architecture - Cloud deployment models - Cloud service models; Cloud Infrastructure; Architecturé Design of Compute and Storage Clouds - Design Challenges Contents 1.1. History of Cloud Computing s+, Dec.-20,21,22, 1.2. System Models for Distributed and Cloud Computing 1.3 NIST Cloud Computing Reference Architecture 1.4 Cloud Deployment Models vecrees, Deo+21,22, 1.5 Cloud Service Models 1.6 Software as a Service (SaaS) . Dec.-22, ° 1.7. Platform as a Service (PaaS). Dec.-20, 1.8 Infrastructure as a Service 1.9 Identity as a Service 1.10 Cloud Infrastructure : Architectural Design of Compute and Storage Clouds vive, Dec-22, 1.11 Migrating into the Cloud 1.12 Two Marks Questions with Answers Marks 13 Marks 13 Marks 13 Marks 13 Marks 5 = (1-1) Cloud Computing History of Cloud Computing f-2 Cloud Architecture Models and Inf Idea of cloud computing was introduced by computer acenneY John publ aly in 1961, Then in 1968, Leonard Kleinrock, a chief scientist of ARPANET project comments about Internet. The general public has been. leveraging forms of Internet-based computer Util since the mid-1990s through various iricarnations of search engines, e-mail servicg open publishing platforms and other types of social media. ! these services popularized and validated core concepts, Though consumer-centric, b ud computing. The Salesforce.com provide, that form the basis of modern-day clo remote service from 1990 to organizations. Amazon launched its web services in 2002 and it provides services jp organizations for storage and remote computing. Cloud computing definition as per Gartner "a style of computing in which scalable and elastic IT-enableq capabilities are delivered as a service to external customers using Intemet technologies’. In 2008, Gartner's original definition of cloud was changed. In the definition, "massively scalable" was used instead of "scalable and elastic.” NIST definition of cloud : Cloud computing is a pay-per-use model for enabling available, convenient, on-demand network access to a shared pool of configurable computing resources (e.g, networks, servers, storage, applications, services) that can be rapidly provisioned and released with minimal management effort ot service-provider interaction. The above cloud definition was published by NIST in 2009, followed by a revised version after further review and industry input that was published in Septembet of 2011 Cloud computing refers to a variety of services available over the Internet that deliver compute functionality on the service provider's infrastructure Its environment (infrastructure) may actually be hosted on either a grid of utility computing environment, but that doesn't matter to a service user. EREE introduction to Cloud Computing Che loud computing refer to a variety of services available over the Interet deliver compute functionality on the sei vice provider's infrastructure. grid or welll Its environme computin; a. (infrastructure) may actually be hosted on either a 8 environment, but that doesn't matter to a service user. Bae EAP UE apt ‘ Bena ett sy ¢ In other words, this is a collection/group of integrated and software and Internet infrastructure (called a platform), * Cloud computing refers to applications and services that run on a distributed network using virtualized resources and accessed by common Internet protocols and networking standards. * Fig. 111 shows cloud symbol. It denotes cloud boundary. © Using the Internet for communication and transport provides hardware, software and networking services to clients. * These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing _ very simple graphical interface or API. Fig. 1.1.1 Cloud symbol * In addition, the platform provides on demand services that are always on anywhere, anytime and anyplace. Pay for use and as needed. * The hardware and software services are available to the general public, enterprises, corporations and business markets. resources : ¢ IT resources are of two types : Software based and hardware based. * Software based resources are virtual server, custom software program and hardware based means physical server and networking devices * IT resources include server, virtual server, storage device, networking device, services and software programs. * An on-premise IT resource can access and interact with a cloud-based IT resource. * An on-premise IT resource can be moved to a cloud, thereby changing it to a cloud-based IT resource. : * Cloud provider : A person, organization, or entity responsible for making a Service available to interested parties. When assuming the role of cloud provider, an organization is responsible for making cloud services available to cloud TECHNICAL PUBLICATIONS® - an up-thrust for knowledge Cloud Architecture Models and Inf : 1-4 ice Level Agreement (SLA) guarantees, d upon Service consumers, as per agree provider have their own IT resources. i © Cloud consumer : A person or organ i Pri i d_ uses service from, Cloud ena id service. zation that maintains a business relationg oviders. The cloud consumer uses a loys service consumer to access a clou: « Cloud service owner : The person or organization that legally owns a cloyg service is called a cloud service owner. The cloud service sie —_ be the cf loud consumer, or the cloud provider that owns the cloud within which the cloug service resides. Resource administrator : Cloud resource administrator is the person op organization responsible for administering a cloud-based IT resource. The cloud consumer or cloud provider, or even third-party organization could be a cloud resource administrator Cloud types : * Most people separate cloud computing into two distinct sets of models 1. Deployment models : This refers to the location and management of the cloud's infrastructure. 2. Service models : This consists of the particular types of services that you can access on a cloud computing platform. * Fig. 11.2 shows NIST cloud computing definitions Deployment models Cc Public pores { Inastructure as Platform as a Software as a a Service (laaS) Service (PaaS) Service (SaaS) Service e Resource Pooling 2 Broad network access Measured service) [On-demand selt-service)| Rapid easto®) Fig. 1.1.2 service : A client ¢, A 7 lient can provision computer resources without servic ice provider personnel nety ce58 to re the ork using standard my ee '© resources in the cloud is available ove ethods ina manner that provides patorn inn ea Cloud Computing 1-5 Cloud Architecture Models and Infrastructure access to clients of all types. This includes a mixture of heterogeneous operating systems, and thick and thin platforms such as laptops, mobile phones, and PDA. * Resource pooling : A cloud service provider creates, resources that are pooled together in a system that supports multi-tenant usage. Physical and virtual systems are dynamically allocated or reallocated as needed. + Rapid elasticity : Resources can be rapidly and elastically provisioned « Measured service : The use of cloud system resources is measured, audited, and reported to the customer based on a metered system. Cloud Components * Cloud computing solutions are made up of several elements. Fig. 1.1.3 shows cloud components. Data centers Client computers \ Ny Distributed servers Fig. 1.1.3 Cloud components 1. Clients : Mobile, terminals or regular computers. 2. Benefits : Lower hardware costs, lower IT costs, security, data security, less power consumption, ease of repair or replacement, less noise. 3. Data centers : Collection of servers where the application to subscribe is housed. It could be a large room in the basement of your building or a room full of servers on the other side of the world TECHNICAL PUBLICATIONS® - an uo-thrust for knowledge Cloud Computing 1-6 4, Virtualizing servers virtual servers to be 5. onaenee servers : Servers don't all have to be nies in the a location, " Tt can be in geographically disparate locations. If something va to happen a one site, causing a failure, the service would still be accessed through anothe | site. If the cloud needs more hardware, they can add them at another site, | + Software can be installed allowing multiple instance, used and a dozen virtual servers can run on one a 1.1.3 | Characteristics of Cloud Computing a On-demand self-service : A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed without requiring human interaction with each service's provider. Ubiquitous network access : Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms . Location-independent resource pooling : The provider's computing resources are pooled to serve all consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. Rapid elasticity : Capabilities can be rapidly and elastically provisioned to quickly scale up, and rapidly released to quickly scale down. Pay per use : Capabilities are charged using a metered, fee-for-service, of adv ertising-based billing model to promote optimization of resource use ERE Role and Boundaries in Cloud Computing Organizations and humans can assume different types of predefined roles depending on how they relate to and/or interact with a cloud and its hosted IT Resources. The cloud computing defines these roles and identifies their mail interactions. 1. Cloud provider : A person, organization or enti stable © ; ty responsible for making a service available interested parties. When assum cae ‘ing the role of cloud provider, an organization * ervices available to cloud consumers, as pet a8 upon Service Li wn eS evel Agreement (SLA) guarantees. Cloud providers have their © Fig. 1.14 shows cloud provider. TECHNICAL PUBLICATIONS® . an up-thrust for knowledge Cloud A ' Cloud service Cloud consumer Cloud provider Fig. 1.1.4 Cloud service and cioud service consumer A cloud provider would have a significant number of roles responsible for the management of its cloud resources including those responsible for selling, onboarding, configuring and supporting cloud services for its consumers. 2. Cloud consumer : * A person or organization that maintains a business relationship with and uses service from, cloud providers. The cloud consumer uses a cloud service consumer to access a cloud service. * Anyone who purchases a cloud service is a consumer and within the consumer there could be an array of roles responsible for configuring and managing the resources from the cloud provider depending on the services obtained. 3. Cloud service owner : * The person or organization that legally owns a cloud service is called a cloud service owner. The cloud service owner can be the cloud consumer or the cloud provider that owns the cloud within which the cloud service resides. * Fig. 1.1.5 shows cloud service owner. Cloud servic consumer, Cloud service owner Cloud service owner Service cloud X Cloud Cloud provider consumer Fig, 1.1.5 Cloud service owner Cloud Computing 4, Resource administrator : 1-8 Cloud Architecture Models and e owner is not called a cloud resource owner is The reason a cloud servic : cloud services. the cloud service owner role only applies to % Cloud resource administrator is the person or organization responsible administering a cloud-based IT resource. The cloud consumer or cloud provider even third-party organization could be a cloud resource administrator. * For example, a cloud service ow administer a cloud service. 5. Cloud auditor : * Cloud auditor is a party that can conduct independent assessment of cloud services, information system operations, performance and security of the cloud implementation. Generally, cloud auditors are categorized based on intent. © For the most part, their focus is on risk and compliance, especially around information security. Other auditors can provide advisory services especially to consumers looking to cut down their bills or raise the lev el of efficiency in the resources consumed. 6. Cloud broker : © Cloud broker is any entity that manages the use, performance, and delivery of cloud services and negotiates relationships between cloud providers and cloud consumers. * Cloud brokers support consumers to get value for money by playing the advisory role especially for consumers who have a hybrid mix of resources from multiple providers. 7. Cloud carrier : © Cloud carrier is an intermediary that provides connectivity and transport of cloud services from cloud providers to cloud consumers. * Most ISPs have taken the role of cloud carriers as they provide the requisite bandwidth needed to connect consumers with providers as well as capabilities that support the connectivity. 8. Trust boundary : + Logical perimeter that typically spans beyond physical boundaries to represent ti extent to which IT resources are trusted. Fig. 1.1.6 shows trust boundary. When analysing cloud environments, the trust boundary is most frequedil associated with the trust issued by the organization acting as the cloud consumer TECHNICAL PUBLICATIONS® - an up-thrust for knowledge mer can contract a cloud resource administrator jy were Serwuury 1-9 Cloud _consumer_} Fig. 1.1.6 Trust boundary Cloud Applications 1, Through cloud cost flexibility, online marketplace gains access to more powerful analytics online. Cloud takes away the need to fund the building of hardware, installing software or paying dedicated software license fees. Greater business scalability enables online video retailer to meet spikes in demand: Cloud enables businesses not just IT operations to add or provision computing resources just at the time they're needed. Greater market adaptability provides online entertainment platform the ability to reach any type of customer device. A third of the executives we surveyed believe cloud can help them adapt to diverse user groups with a diverse assortment of devices, Masked complexity enables access to services, no matter how intricate the technology they're built on. 5. With context-driven variability, "intelligent assistants" are possible. "Because of its expanded computing power and capacity, cloud can store information about user preferences, which can enable product or service customization,” the report states. 6. Ecosystem connectivity enables information exchange across business partners. Pros and Cons of Cloud Computing Pros of cloud computing : 1. Lower computer costs : Since applications run in the cloud, not on the desktop PC, your desktop PC does not need the processing power or hard disk space demanded by traditional desktop software 2. Improved performance : Computers in a cloud computing system boot and run faster because they have fewer programs and processes loaded into memory. 3, Reduced software costs : Instead of purchasing expensive software applications, you can get most of what you need for free: TECHNICAL PUBLICATIONS® = an up-thrust for knowledae 10 Cloud Architecture Models and jr 1 Cloud Computing web-based application, you yet + When you access a 4. Instant software updates ibadatvup grade latest version - without needing to pay for or downlo Pe ibility : You do not have to worry aboys ent format compatibility + Yo F v ——, machine being compatible with other ye documents you create on you applications or operating systems. 6. Unlimited storage capacity : Cloud computing offers virtually limitless storage, 7. Increased data reliability : Unlike desktop computing, in which if a hard disk crashes and destroy all your valuable data, a computer crashing in the doug should not affect the storage of your data. § Universal document access : All your documents are instantly available fom wherever you are. 9 Latest version availability : The cloud always hosts the latest version of your documents; as long as you are connected, you are not in danger of having an outdated version. 10. Easier group collaboration Sharing documents leads directly to better collaboration, 11. Device independence : Move toa Portable device and your applications and documents are still available. Cons of cloud computing : It requires a constant Internet connection : Cloud computing is impossible if you cannot connect to the Internet. 2. Features might be limited, Stored data might not be secure : With cloud computing, all your data is stored on the cloud, ; 4 Does not work well with low-speed connections ERE bitterence between Cloud and Traditional Data Centers Cloud iti Traditional data centers Piatt is a virtual resource that helps businesses to store, organize and operate data wees ese 2p efficiently, | I resource that helps | 0 store, organize and operate data | L Infrastructure (hardware) cost is less, Infrastructure (hardware) cost is mor. TECHNICAL PUBLIGATIONs® . ,, Up-thrust for knowledes EB Multitenant Technology A multi - tenant cloud is a cloud computing architecture that allows customers to share computing resources in a public or private cloud. Each tenant's data is isolated and remains invisible to other tenants. It allows multiple users to work in a software environment at the same time, each with. their own separate user interface, resources and services. The multitenant application design was created to enable multiple users (tenants) to access the same application logic simultaneously. Multitenancy can describe hardware or software architectures in which multiple systems, applications, or data from different enterprises are hosted on the same physical hardware. Multitenant applications typically include a level of customization for tenants, such ‘as customizing the look and feel of the application or allowing the tenant to decide on specific access control permissions and restrictions for users. "Tenants" is a term for a group of users or software applications that all share access to the hardware through the underlying software. Multiple tenants on a server all share the memory, which is dynamically allocated and cleaned up as needed. They also share access to system resources, such as the network controller. Fig. 1.1.7 shows multi-tenant technology. Open shared application and one shared database aD Sa ‘Application 1 vatabase Fig. 1.1.7 Multi-tenant technology TECHNICAL PUBLICATIONS® - an up-thrust for knowledge ed tenancy on public cloud provi derg and Google Cloud. © Multi-tenant architecture is to offer a Amazon Web Services, Microsoft Azur . the application, such as : re, tomize features of the a " |. User int : interface. i ustomize the rules, logic, and workflows 9 lemented in the application. 3, Data model : Tenants can extend the data schema of the application to include ds in the application data structures. 2, Business process : Tenants can © the business processes that are imp exclude, or rename fiel 4, Access control : Tenants can independently control the access rights for use and groups. * Common characteristics of multitenant applications are as follows : 1. Usage isolation - The usage behaviour of one tenant does not affect the application availability and performance of other tenants. 2. Data security - Tenants cannot access data that belongs to other tenants. 3. Recovery - Backup and restore procedures are separately executed for the data of each tenant. 4. Application upgrade - Tenants are not negatively affected by the synchronous upgrading of shared software artifacts. 5. Scalability - The application can scale to accommodate increases in usage by existing tenants and/or increases in the number of tenants 6 Metered usage - Tenants are charged only for the application processing afd features that are actually consumed. 7. Data tier isolation - Tenants can have individual databases, tables and schemi isolated from other tenants. Benefits of a multitenancy technology : © Costs savings: It yields tremendous economy of scale for the provider so he & offer the service at a lower cost to customers, 2, Improved quality, User satisfaction, and “4 i custo ion : a application is one hu provide otic large community hosted by the provider which can gat 3. Improved security : Most ¢ pase making them vulnerable to r ' sent enterprise security models are perimetel inside attacks, x TECHNICAL PUB) Ina ,,., Cloud Computing Smee ry Cloud Architecture Models and Infrastructure 1. Explain the following challenges in cloud. i) Security ti) Data lock-in and standardization. iti) Fault tolerance and disaster recovery. NR drawbacks achieved by it in the banking and insurance sectors. 3. Explain about evolution of cloud computing in detail. OR ee es Formulate stage-by-stage evolution of cloud with neat sketch and formulate any three benefits, ORD Oa ee cog i System Models for Distributed and Cloud Computing * Large number of autonomous computer nodes are used for building distributed system and cloud computing. These nodes are interconnected by LANs, WANs or SANs in a hierarchical manner. Now a days, new technology is applied for networking. Few LAN switches can easily connect hundreds of machines as a working cluster. A WAN can connect many local clusters to form a very large cluster of clusters. tech * Massive system are formed using LAN and WAN rem with cluster. Massive systems are considered highly scalable and can reach web scale connectivity, either physically or logically. © Massive systems are classified into four computing grids and Internet clouds over huge data centers. Parameters Cloud Architecture, Virtualized network size and cluster of servers connectivity over data centers via SLA Control and Dynamic resources resource management provisioning of servers, storage, and networks Computer cluster N/W of compute nodes interconnected by SAN, LAN, or WAN hierarchically Homogeneous nodes with distributed control, running UNIX or Linux groups Peer to Peer clusters, P2P networks, Grid Computing Network Flexible network Heterogeneous of client ‘Clusters machines interconnected logically by high - speed connected by an network links overlay network over selected resource sites Autonomous: comes se control, serv client nodes, free SO ith | in and out, with quthenticated self - security organization Cloud Architecture Models and In Cloud Computing 1-14 See ere ee Most appealing _Distributeg ete | omure tebe fle sy ; i content | services computing and computing Hae Gaal global prob I outsourced search engines 2 solving ang i computing ‘and web services social networking. oneal services : Google search Gnutella, eMule, TeraGrid, UK ee ee ae BitTorrent, EGEE, D-Grig Bhiecloud, AWS, SunBlade, IBM Napster, KaZaA, ChinaGrid Microsoft Azure Road Runner, Skype, JXTA Cray XT, } * A distributed system is a collection of independent computers that appears to its users a single coherent system. A distributed system can consist of any number of possible configurations, such as mainframes, personal computers, workstations minicomputers and so on, * The major milestones have led to cloud computing are mainframes computing, cluster computing and grid computing. ERI clusters of Cooperative Computers ¢ Computing cluster consists of interconnected stand - alone computers which work cooperatively as a single integrated computing resource. EERE cluster Architecture * Fig, 121 shows architecture of a typical server cluster. To build a larger cluster with more nodes, the interconnection network can be built with multiple levels of Gigabit Ethernet. Using hierarchical construction with SAN, LAN, or WAN, We can build scalable clusters with an increasing number of nodes Server - 4 [Server - 2} Server -N, Fig. 1.2.1 Architecture of a typical server cluster TECHNICAL PUBLICATIONS® an up-thrust for knowledge (Cloud Computing 1-15 Cloud Architecture Models and infrastructure Cluster is connected to the Internet via a Virtual Private Network (VPN) gateway. The gateway IP address locates the cluster. Most clusters have loosely coupled node computers. All resources of a server node are managed by their own OS. Thus, most clusters have multiple system images as a result of having many autonomous nodes under different OS control. Single System Image Single System Image (SSI) is an abstraction that provides the illusion that a multicomputer or cluster is a single machine. There are individual instances of the Operating Systems (OSs) running on each node of a multicomputer, processes working together are spread across multiple nodes and files may reside on multiple disks. An SSI provides a unified view of this collection to users, programmers and system administrators. This unification makes a system easier to use and more efficient to manage. Multicomputers consist of nodes, each with its own memory, CPUs and a network interface. In the case of clusters, each node is a stand - alone computer made of commodity, off-the-shelf parts. Instead of viewing this collection of computers as individual systems, it is easier and more economical if users, programmers and system administrators can treat the collection as a single machine. Single System Image (SSI) consisting of single entry point, single file hierarchy, single I/O space, single networking scheme, single control point, single job management system, single memory space and single process space. The ultimate goal of SSI is for a cluster to be as easy to use as a desktop computer. Single job management system: All cluster jobs can be submitted from any node to a single job management system. Single user interface : The users use the cluster through a single graphical interface. Such an interface is available for workstations and PCs. EE2A Grid Computing Infrastructures g is a distributed computing system where a group of computers Grid computin, computing power, storage, are connected to create and work as one large virtual database, application and service. d software infrastructure that provides access to high - end network of computers a hardware an Computational grid computational capabilities. A computational grid is a loose linked to perform grid computing. TECHNICAL PUBLICATIONS® - an up-thrust for knowledge © Fig. 1.2.2 shows grid computing: Computer systems Ms Grid users: Grid server / Control node Providers / Resources Fig. 1.2.2 Grid computing * In a computational grid, a large computational task is divided up amon individual machines, which run calculations in parallel and then return results t the original computer, * These individual machines are nodes in a network, which may span multiph administrative domains and may be geographically distant. * Grid systems are classified into two categories : Computational or data grids and P2P grids. Peer-to-Peer Network Families * The P2P architecture offers a distributed model of networked systems, First, a P network is client - oriented instead of server - oriented. + In a P2P system, every node acts as both a client and a server, providing pat the system resot A 5 nurces. are simply client computers connected Internet, All client machines act autonomously to join or leave the system free! No central coordination or central database is needed ‘ * P2P network does not use i : a oe olla interconnection network. The phys ‘ork formed at various Internet 40 CEN OAS RUSTON ave for knowledge - Cloud Computing tte Cloud Architecture Models and Infrastructure randomly using the TCP/IP protocols. Thus, the physical network varies in size and topology dynamically due to the free membership in the P2P network. are built at application layer which is on the top of the topology. These overlays are used for indexing and peer discovery which makes the P2P system independent from the physical network topology. Contents are directly exchanged between the underlying Internet Protocol (IP) networks. ‘orl Overlay Networks * Files are distributed in the participating peers. Based on communication or file - sharing needs, the peer IDs form an overlay network at the logical level. This overlay is a virtual network formed by mapping each physical machine with its ID, logically, through a virtual mapping. * There are two types of overlay networks : Unstructured and structured. * Structured P2P overlay network topology is a tightly controlled network. The contents are placed only at es locations but not at random peers. Structured peer-to-peer overlay networks d Hash Table (DHT), are scalable networks which supports Internet - scale applications. © The applications of structured P2P overlays are construction of large - scale networks, decentralized applications, distributed storage, group communication and content distribution. The advantage of this overlay is messages correctly reach the destination even if large number of nodes crashes. * An Unstructured P2P overlay network has no prior knowledge about the topology of the network. Here the peers join yspecific rules. A resource may take a long time for the search operation because most of the time there is no relation between the name of resources and their locations. * The advantages of this overlay are : Easy implementation, simplicity, keyword search and dynamic environments. The major drawback of this overlay is the scalability problem. EEZE] PP Application Families * P2P networks are classified into four groups : Distributed File Sharing, Collaborative Platform, Distributed P2P and computing P2P Platform. TECHNICAL PUBLICATIONS® 1n up-thrust for knowledge x Secuty hoes, by _selfish partners and peer ‘SETI@home, Geonome@home P2P Computing Challenges Hardware, software and network requirements are three problems face by P2P computing. There are too many hardware models and architectures to select from incompatibility exists between software and the OS; and different network connections and protocols make it too complex to apply in real applications. Data locality, network proximity and interoperability are three design objectives in distributed P2P applications. PaP performance is affected by routing efficiency and self - organization © Participating peers. Fault tolerance, failure management and load balancing até | other important issues in using overlay networks, Security, privacy and copyright violations are major worries by those in the industry in terms of applying P2P technology ; + logy in business . In a PoP network, all clients provide resources inch feat aa | Bret bandwidth: luding computing power, storage spac The distributed nature of P2P netwoy tks also increa Peer failures do not form a single p cases robui F stness, because limited oint of failure, interactive and user a ee Hore * Cloud allows workloads to be deployed and scaled out quickly through rapid Epyetoning of virtual or physical machines. The cloud Supports redundant, self - recovering, highly scalable programming models that allow workloads to recover from many unavoidable hardware/software failures. Internet Clouds * Cloud computing applies a virtualized platform with elastic resources on demand by provisioning hardware, software and data sets dynamically. Fig. 1.23 shows virtualized resources from data centers to form an Internet cloud. Hardware] [ Software Internet clouds Network Paid service ‘Submit request Fig. 1.2.3 Virtualized resources from data centers to form an Internet cloud + The idea is to move desktop computing to a service - oriented platform using server clusters and huge databases at data centers. Cloud computing leverages its low cost and simplicity to benefit both users and providers. * Machine virtualization has enabled such cost - effectiveness. The cloud ecosystem must be designed to be secure, trustworthy and dependable. FEA Cloud Landscape * Cloud service models are as follows 1. Software as a Service : dispose the applied software unified on their server, the user'can subscribe applied software service from the manufacturer through Internet. 2. Platform as a Service (PaaS) : Ha85%kes develop environment as a service to supply. This layer provides a platform for creating applications 3. Infrastructure as a Service (Iaas) : In this layer, servers, network devices and storage disks are made available to organizations as services on a need-to basis. TECHNICAL PUBLICATIONS® - an un-thrust for knowledge ' Cloud Architecture Models and Cloud Computing pe et ay and web * Reasons to adapt the cloud for upgraded Internet eppicon® vig are as follows : igher energy efficj 1. Desired location in areas with protected space Soe yo 2. Sharing of peak-load capacity among 4 large utilization. pool of users, improving Overy cture maintenance duties from domain - 3. Separation of infrastru SPecife application development 4. Significant reduction in cloud computing cost, computing paradigms . Cloud computing programming and application development 5. 6. Service and data discovery and content/service distribution 7, 8. compared with tradition, . Privacy, security, copyright and reliability issues . Service agreements, business models and pricing policies E24 Difference between Distributed, Grid and Cloud Computing Distributed computing Grid computing Cloud computing ‘Small to medium size Large size Small to large size Low security requirement High security requirement Low security requirement It is homogeneous It is heterogeneous It is heterogeneous Network type is private Network type is private Network type is public It is based on Ethernet It is based on Ethernet It is based on Ethernet SLA requirement is strict SLA requirement is high SLA requirement is low 1 1.3 | NIST Cloud Computing Reference Architecture «Fig. 1.3.1 shows NIST cloud computing reference architecture. It defines five ™/ actors : cloud consumer, cloud provider, cloud carrier, cloud auditor and cloud broker * Each actor is an entity (organization) that participates in a transaction oF process and/or performs tasks in cloud computing. Cloud consumer : A person or organization that maintains a business relations? with and uses service from, cloud providers det 1 A oe a Cloud provider : A person, organization, or entity responsible for maki"8 service available to interested parties, i _ Cloud Computing 1-21 Cloud Architecture Models and Infrastructure omy.) com i i § AERA ee ‘Aunseg, Portability / interoperability Provisioning / configuration Cloud service management Cloud provider Cloud carrier Service orchestration control layer Physical resource layer Hardware Resource abstraction and Service layer ees S 33 E os . 8 5 é Fig. 1.3.1 NIST cloud computing reference architecture * Cloud auditor : A party that can conduct independent assessment of cloud services, information system operations, performance and security of the cloud implementation. * Cloud broker : An entity that manages the use, performance and delivery of cloud and negotiates relationships between cloud providers and cloud services consumers. an up-thrust for knowledge TECHNICAL PUBLICATIONS® EJ cloud Deployment Models 1. Public cloud : * Examples of public service * Public cloud benefits ; ‘Architecture Models and Infrag qe Cloud ret Cloud carrier : An intermediary that provides connectivity and transport of dloug * Cloud carrier : services from cloud providers to cloud consumers. ; is typically a third - party enti, Cloud Services Broker (CSB) : The CSB is typ’ J Y op hee to multiple customers of cloud - pa, company that looks to extend value to : oa . services through relationships with multiple cloud service pro acts as liaison between cloud services customers and cloud service providers, selecting i best provider for each customer and monitoring the cana A se provides 1, Service intermediation : A CSB enhances a given service by improving som, specific capability and providing value - added services to cloud consumer, The improvement can be managing access to cloud services, identity management, performance reporting, enhanced security, etc. 2. Service aggregation : A CSB combines and integrates multiple services inte one or more new services. The broker provides data integration and ensures the secure data movement between the cloud consumer and multiple cloud providers, 3 Service arbitrage : Service arbitrage is similar to service aggregation except that the services being aggregated are not fixed. Service arbitrage means a broker has the flexibility to choose services from multiple agencies. The cloud broker, for example, can use a credit - scoring service to measure and select an agency with the best score. * Cloud deployment models are refers to cloud’s infrastructure * Deployment models are defined by the ownership and control of architectural design and the degree of available customization Cloud deployment models a private public and community clouds, Fig. 14.1 shows cloud deployment model. (See Fig. 1.4.1 on next page) * The cloud infrastructure is made available to the general public or a large indust! Broup and is owned by an organization selling cloud services, Public cloud is a eee, ata centre that offers the same services to all its users: T™ services are accessible for everyone and much used for the consumer segment ® ate Facebook, Google and Linkedin a) Low investment hurdle b) Good test/developmer servers, Pay for what user use, ay nt environment for applic ee ‘ations that scale TECHNICAL PUBI Ioaricp ie ans ;

You might also like