×
Study like there’s no tomorrow because if you keep putting off your studies for tomorrow, you’ll probably be too late.
--Your friends at LectureNotes
Close

Cloud Computing

by Rayipudi Edukondalu
Type: NoteDownloads: 375Views: 11345Uploaded: 8 months agoAdd to Favourite

Share it with your friends

Suggested Materials

Leave your Comments

Contributors

Rayipudi Edukondalu
Rayipudi Edukondalu
Table of Content Cloud Computing Tutorial......................................................... 2 Audience .................................................................................. 2 Prerequisites ............................................................................ 2 Copyright & Disclaimer Notice .................................................. 2 Cloud Computing - Overview ................................................... 9 What is Cloud? .......................................................................................... 9 What is Cloud Computing? ........................................................................ 9 Basic Concepts........................................................................................ 10 DEPLOYMENT MODELS ........................................................................ 10 History ..................................................................................................... 12 Benefits ................................................................................................... 12 Risks ........................................................................................................ 13 SECURITY & PRIVACY .......................................................................... 13 LOCK-IN .................................................................................................. 13 ISOLATION FAILURE ............................................................................. 13 MANAGEMENT INTERFACE COMPROMISE ........................................ 14 INSECURE OR INCOMPLETE DATA DELETION .................................. 14 Characteristics ......................................................................................... 14 ON DEMAND SELF-SERVICE ............................................................... 14 BROAD NETWORK ACCESS ................................................................ 14 RESOURCE POOLING .......................................................................... 15 RAPID ELASTICITY ............................................................................... 15 MEASURED SERVICE ........................................................................... 15 Cloud Computing - Planning .................................................. 16 Strategy Planning Phase ......................................................................... 17 CLOUD COMPUTING VALUE PROPOSITION ..................................... 17 CLOUD COMPUTING STRATEGY PLANNING .................................... 18 Cloud Computing Tactics Planning Phase .............................................. 18 BUSINESS ARCHITECTURE DEVELOPMENT .................................... 18 IT ARCHITECTURE DEVELOPMENT ................................................... 18 REQUIREMENTS ON QUALITY OF SERVICE DEVELOPMENT ......... 18 TRANSFORMATION PLAN DEVELOPMENT ....................................... 18 Cloud Computing Deployment Phase ...................................................... 18 CLOUD COMPUTING PROVIDER ........................................................ 19 MAINTENANCE AND TECHNICAL SERVICE ....................................... 19 Cloud Computing-Technologies ............................................. 20 Virtualization ............................................................................................ 20
Service-Oriented Architecture(SOA)........................................................ 21 Grid Computing ....................................................................................... 22 Utility Computing ..................................................................................... 23 Cloud Computing-Architecture ............................................... 24 FRONT END ........................................................................................... 25 BACK END .............................................................................................. 25 Cloud Computing Infrastructure.............................................. 26 HYPERVISOR ........................................................................................ 26 MANAGEMENT SOFTWARE ................................................................. 26 DEPLOYMENT SOFTWARE .................................................................. 26 NETWORK .............................................................................................. 26 SERVER ................................................................................................. 27 STORAGE .............................................................................................. 27 Infrastructural Constraints ....................................................................... 27 TRANSPARENCY .................................................................................. 27 SCALABILITY ......................................................................................... 27 INTELLIGENT MONITORING ................................................................ 27 SECURITY .............................................................................................. 28 Public Cloud Model ................................................................ 29 Benefits ................................................................................................... 30 COST EFFECTIVE ................................................................................. 30 RELIABILITY........................................................................................... 30 FLEXIBILITY ........................................................................................... 30 LOCATION INDEPENDENCE ................................................................ 30 UTILITY STYLE COSTING ..................................................................... 30 HIGH SCALABILITY ............................................................................... 30 Disadvantages ......................................................................................... 31 LOW SECURITY..................................................................................... 31 LESS CUSTOMIZABLE .......................................................................... 31 Private Cloud Model ............................................................... 32 HIGHER SECURITY AND PRIVACY ..................................................... 33 MORE CONTROL................................................................................... 33 COST AND ENERGY EFFICIENCY ....................................................... 33 Disadvantages ......................................................................................... 33 RESTRICTED AREA .............................................................................. 33 INFLEXIBLE PRICING............................................................................ 33 LIMITED SCALABILITY .......................................................................... 33 ADDITIONAL SKILLS ............................................................................. 34 Hybrid Cloud Model................................................................ 35
Benefits ................................................................................................... 35 SCALABILITY ......................................................................................... 36 FLEXIBILITY ........................................................................................... 36 COST EFFICIENCIES ............................................................................ 36 SECURITY .............................................................................................. 36 Disadvantages ......................................................................................... 36 NETWORKING ISSUES ......................................................................... 36 SECURITY COMPLIANCE ..................................................................... 36 INFRASTRUCTURAL DEPENDENCY ................................................... 37 Community Cloud Model ........................................................ 38 Benefits ................................................................................................... 39 COST EFFECTIVE .................................................................................. 39 SECURITY .............................................................................................. 39 ISSUES ................................................................................................... 39 lnfrastructure-as-a-service...................................................... 40 Benefits ................................................................................................... 41 FULL CONTROL OVER COMPUTING RESOURCES THROUGH ADMINISTRATIVE ACCESS TO VMS .................................................... 41 FLEXIBLE AND EFFICIENT RENTING OF COMPUTER HARDWARE . 42 PORTABILITY, INTEROPERABILITY WITH LEGACY APPLICATIONS 42 Issues ...................................................................................................... 42 COMPATIBILITY WITH LEGACY SECURITY VULNERABILITIES ....... 42 VIRTUAL MACHINE SPRAWL ............................................................... 43 ROBUSTNESS OF VM-LEVEL ISOLATION .......................................... 43 DATA ERASE PRACTICES ................................................................... 43 Characteristics ......................................................................................... 43 Platform-as-a-Service ............................................................ 44 Benefits ................................................................................................... 45 LOWER ADMINISTRATIVE OVERHEAD .............................................. 46 LOWER TOTAL COST OF OWNERSHIP .............................................. 46 SCALABLE SOLUTIONS ....................................................................... 46 MORE CURRENT SYSTEM SOFTWARE ............................................. 46 Issues ...................................................................................................... 46 LACK OF PORTABILITY BETWEEN PAAS CLOUDS .......................... 47 EVENT BASED PROCESSOR SCHEDULING ...................................... 47 SECURITY ENGINEERING OF PAAS APPLICATIONS ....................... 47 Characteristics ......................................................................................... 47 PaaS Types ............................................................................................. 48 STAND-ALONE DEVELOPMENT ENVIRONMENTS ............................ 48
APPLICATION DELIVERY-ONLY ENVIRONMENTS ............................ 48 OPEN PLATFORM AS A SERVICE ....................................................... 48 ADD-ON DEVELOPMENT FACILITIES ................................................. 48 Software-as-a-Service ............................................................ 49 Characteristics ......................................................................................... 49 Benefits ................................................................................................... 50 MODEST SOFTWARE TOOLS .............................................................. 50 EFFICIENT USE OF SOFTWARE LICENSES....................................... 50 CENTRALIZED MANAGEMENT & DATA .............................................. 50 PLATFORM RESPONSIBILITIES MANAGED BY PROVIDERS ........... 50 MULTITENANT SOLUTIONS ................................................................. 50 Issues ...................................................................................................... 51 BROWSER BASED RISKS .................................................................... 51 NETWORK DEPENDENCE ................................................................... 51 LACK OF PORTABILITY BETWEEN SAAS CLOUDS .......................... 51 OPEN SAAS AND SOA .......................................................................... 51 ldentity-as-a-Service .............................................................. 53 Identity ..................................................................................................... 53 Single Sign-On (SSO) ............................................................................. 54 SSO WORKING ...................................................................................... 54 Federated Identity Management (FIDM) .................................................. 55 OpenID .................................................................................................... 56 Benefits ................................................................................................... 56 Network-as-a-Service ............................................................. 57 How NaaS is delivered? .......................................................................... 57 Mobile NaaS ............................................................................................ 57 NaaS Benefits.......................................................................................... 58 INDEPENDENCE ................................................................................... 59 BURSTING ............................................................................................. 59 RESILIENCE ........................................................................................... 59 ANALYTICS ............................................................................................ 59 EASE OF ADDING NEW SERVICE ELEMENTS .................................. 59 SUPPORT MODELS .............................................................................. 60 ISOLATION OF CUSTOMER TRAFFIC ................................................. 60 Cloud Computing Management .............................................. 61 Cloud Management Tasks ....................................................................... 61 AUDIT SYSTEM BACKUPS ................................................................... 62 SYSTEM'S DATA FLOW ........................................................................ 62 BEWARE OF VENDOR LOCK-IN .......................................................... 62

Lecture Notes