Académique Documents
Professionnel Documents
Culture Documents
Fundamentals
Mr.M.Jaganathan
Assistant Professor @ K S R Institute for Engineering and Technology
jaganbecs@gmail.com
Session-I
Evolution
Introduction
The basics of cloud computing
Issues of migrating to the cloud
Three layers
Open source cloud technologies
Security in the cloud
Cloud Operating Systems
Advantages and disadvantages
Conclusion
Session-II
Types of Cloud
Some programming Concepts.
Job opportunities and Designations
About EMC2
Social Networks
Courses on Cloud computing
A revolution..
Cloud computing is indeed a revolution
Change in
- Computer architecture,
- Software and tools development,
- The way we store,
- Distribute and Consume information.
App
App
App
OS
OS
OS
Hypervisor
Hardware
Virtualized Stack
App
App
App
App
Guest OS
(Linux)
Guest OS
(NetBSD)
Guest OS
(Windows)
VM
VM
VM
Xen
VMWare
UML
Denali
etc.
Hardware
80%
50%
Labor
Expense
50%
Other
Expenses
Deploy
10%
Operate
25%
Support
10%
Facilities
7%
Network
11%
SW
9%
HW
23%
Three layers
SaaS Software as a Service
IaaS Infrastructure as a Service
PaaS Platform as a Service
DaaS Desktop as a Service
Storage, Database, Information, Process,
Application, Integration, Security, Management,
Testing-as-a-service
SaaS Examples
IaaS Examples
- Is a platform for developers to write and create their own SaaS i.e.
applications.
- Which means rapid development at low cost.
- E.g.: Salesforce.com, Windows Azure etc.
PaaS Examples
355M Active
Accounts
Over 4B WW
Queries Each
Month
Over 459M
Unique Users
Over 6M Songs
In The Catalog
25M Users
14B Ads
Per Month
PC
MOBILE
TV/HOME
services
AppFabric
Relational data
Management
Connectivity
Access control
OpenNebula
@ Universidad Complutense de Madrid
Supports the idea of hybrid clouds
Combining a private cloud with a public cloud
Supports Xen, KVM/Linux, and VMware
Barriers to Cloud
Security
Privacy
Connectivity and Open access
Reliability
Interoperability
Independence from CSP (cloud service provider)
Economic value
IR governance
Changes in IT organization
Political issues
Security Issues
"It is so easy
to get started"
Just pick up your credit
card and get started on
AWS
Not many questions asked
..... maybe that's a problem?
Sharing cage...
Bad neighbors....
Data loss....
Summary
Cloud services gives economy of scale. The same amount
of investment in security buys better protection
But the massive concentrations of resources and data
present a more attractive target to attackers
Cloud providers need to guard against theft or denial of
service attacks by users.
Users need to be protected against one another.
And users need to be protected against their cloud
providers
The old problems didn't go away, they just got a little
bigger
Advantages
- Lower computer costs:
Contd..
Improved performance:
Contd..
Instant software updates:
No obsolete software and high upgrade costs.
When the application is web-based, updates happen automatically
available the next time you log into the cloud.
When you access a web-based application, you get the latest
version without needing to pay for or download an upgrade.
Contd..
Unlimited storage capacity:
Cloud computing offers virtually limitless storage.
Your computer's current 1 Tbyte hard drive is small
compared to the hundreds of Pbytes available in the cloud.
Device independence.
You are no longer tethered to a single computer or network.
Disadvantages
Requires a constant Internet connection
Does not work well with low-speed connections
Features might be limited
Can be slow
Stored data might not be secure
Stored data can be lost
Conclusion
Cloud Computing is outpacing the IT industry
Real business value can be realized by customers of all
sizes
Cloud solutions are simple to acquire, dont require long
term contracts and are easier to scale up and down as
needed
Proper planning and migration services are needed to
ensure a successful implementation
Public and Private Clouds can be deployed together to
leverage the best of both
Third party monitoring services ensure customer are
getting the most out of their cloud environment
Security Compliance and Monitoring is achievable with
careful planning and analysis