g1 cloud computing
DESCRIPTION
cloud computingTRANSCRIPT
Presentation on:
Cloud Computing
Under the Guidance :Mrs. Sudha Gupta( Associate Professor )
Presented By :Durgesh Kumar JaiswalM.E. ( ETRX ) 1st year Roll No. 1402006Ashish Nanoti M.E. ( ETRX ) 1st year Roll No. 1402009
Department of Electronics Engineering
Cloud Computing
1
Subwaves within the information age
Cloud Computing
2
Why Cloud?
Cloud computing is a low-cost solution.
Cloud computing offers responsiveness and flexibility.
The IT expense matches the transaction volumes.
Business users are in direct control of technology decisions.
The line between home computing applications and enterprise applications will blur.
Cloud Computing
3
Worldwide IT cloud services spending
Cloud Computing
4
Evolution of Cloud Computing
Cloud Computing
5
Evolution of Cloud Computing (cont.)
ISP 1.0 ISPs quickly proliferated to provide access to the Internet
for organizations and individuals. These early ISPs merely provided Internet connectivity for
users and small businesses, often over dial-up telephone service.
ISP2.0 ISPs consolidated and searched for other value-added
services, such as providing access to email and to servers at their facilities.
Cloud Computing
6
Evolution of Cloud Computing (cont.)
ISP3.0 Colocation facilities: specialized facilities for hosting
organizations’ (customers’) servers, along with the infrastructure to support them and the applications running on them.
Those facilities are “a type of data center where multiple customers locate network, server, and storage gear and interconnect to a variety of telecommunications and other network service provider(s) with a minimum of cost and complexity.”
Cloud Computing
7
Evolution of Cloud Computing (cont.)
ISP4.0 Application Service Providers (ASPs), focusing on a higher
value-added service of providing specialized applications for organizations, and not just the computing infrastructure.
ASPs typically owned and operated the software application(s) they provided, as well as the necessary infrastructure.
Cloud Computing
8
Cloud Computing (ISP5.0)
Although ASPs usually provided services to multiple customers (just as SaaS providers do today), they did so through dedicated infrastructures. Each customer had its own dedicated instance of an application, and that instance usually ran on a dedicated host or server.
The important difference between SaaS providers and ASPs is that SaaS providers offer access to applications on a shared, not dedicated, infrastructure.
Cloud Computing
9
Cloud Computing Defined
Properties Descriptions
Multi-tenancy (shared resources)
cloud computing is based on a business model in which resources are shared at the network level, host level, and application level.
Massive scalability
cloud computing provides the ability to scale to tens of thousands of systems, as well as the ability to massively scale bandwidth and storage space
Elasticity Users rapidly increase and decrease their computing resources as needed, as well as release resources for other uses when they are no longer required.
Pay as you go Users pay for only the resources they actually use and for only the time they require them.
Self-provisioning of resources
Users self-provision resources, such as additional systems (processing capability, software, storage) and network resources
Cloud Computing
10
Attributes of Elasticity
Cloud Computing
11
SPI Service Model
Cloud Computing
12
Architecture for Relevant Technologies
Cloud Computing
13
Cloud Services Delivery Model
Cloud Computing
14
Saas, PaaS, IaaS
Cloud Computing
15
Cloud Deployment Model
Private Clouds
Public Clouds
Hybrid Clouds
Cloud Computing
16
Public Clouds
Cloud Computing
17
Hybrid Clouds
Cloud Computing
18
Key Drivers to Adopting Clouds
Small Initial Investment and Low Ongoing Costs
Economies of Scale
Open Standards
Sustainability
Cloud Computing
19
Common Features of Cloud Providers
Development
Environment: IDE, SDK,
Plugins
Production Environment
Simplestorag
e
Table Store <key,
value>
Drives Accessible through Web services
Management Console and Monitoring tools
& multi-level security
Cloud Computing
20
Windows Azure
Enterprise-level on-demand capacity builder
Fabric of cycles and storage available on-request for a cost
You have to use Azure API to work with the infrastructure offered by Microsoft
Significant features: web role, worker role , blob storage, table and drive-storage
Cloud Computing
21
Amazon EC2
Amazon EC2 is one large complex web service.
EC2 provided an API for instantiating computing instances with any of the operating systems supported.
It can facilitate computations through Amazon Machine Images (AMIs) for various other models.
Signature features: S3, Cloud Management Console, Map -Reduce Cloud, Amazon Machine Image (AMI)
Excellent distribution, load balancing, cloud monitoring tools
Cloud Computing
22
Google App Engine
This is more a web interface for a development environment that offers a one stop facility for design, development and deployment Java and Python-based applications in Java, Go and Python.
Google offers the same reliability, availability and scalability at par with Google’s own applications
Interface is software programming based
Comprehensive programming platform irrespective of the size (small or large)
Signature features: templates and apps pot, excellent monitoring and management console
Cloud Computing
23
Barriers to Cloud Computing Adoption in the Enterprise
Security
Privacy
Connectivity and Open Access
Reliability
Interoperability
Independence from Cloud Service Providers
Economic Value
Changes in the IT Organization
IT Governance
Political Issues Due to Global Boundaries
Cloud Computing
24
Complexity of security in cloud environment
Cloud Computing
25
Security Issues in Service Models
Security in SaaS Enterprises lack of
visibility about the way their data is stored and secured.
Security in IaaS IaaS only provides basic
security (perimeter firewall, load balancing, etc.)
Applications moving into the cloud will need higher levels
Security in PaaS A developer can tap to
build their applications without having any clue about what is going on underneath the service.
A hacker can leverage the PaaS cloud infrastructure for malware command and control and go behind IaaS applications.
Cloud Computing
26
Thank you…!!
Cloud Computing
27