Felhő alapú technológiák 1
Felhő alapú technológiák 1
(VIRTUALIZÁCIÓ)
BH-MIT065-[NL]-EA
Dr. Nyikes Zoltán
docens
nyikes.zoltan@uni-milton.hu
1. Előadás
Main topics
01 What Is Cloud Computing? 07 Strategies for Cloud Adoption
02 Cloud Models 08 Applications in the Cloud
03 Service Models 09 Cloud Service Rollout
04 Current Cloud Technologies 10 Cloud Service-Level Management
05 Cloud Business Value 11 Security in the Cloud
06 Cloud Infrastructure Planning 12 Privacy and Compliance
1 What Is Cloud Computing?
The "terrible truth"?
01.01 Defining cloud computing
• network-accessible computing resource pools
• hardware-independent framework for future growth and development
• resources and processing power available to each can be adjusted on the fly to meet demand
• allowing an organization to
• spin up a proof-of-concept application
• expand that to a full prototype, and then
• roll it out for full use
without having to worry about whether existing hardware, data centre space, power, and cooling are capable of handling the load
Cloud ≈philosophy &
architecture concept
Separate
• application
• OS
• DB
• HW
• horizontal hybrid models: provide to different • vertical hybrid models: bring together all
access groups services required for a particular task, such as
• database
• web interface
• payment application
• shipping management applications
supporting an e-purchase service
02.04 Including future cloud models
• As cloud computing matures, additional models
will undoubtedly evolve to meet arising needs.
• Cloud-based disaster recovery and backup are
expanding traditional data center and core IT
functions
• Users can often access cloud services entirely
within their web browsers, bypassing many
controls of information provisions in the
enterprise environment (Shadow IT)
• Regulatory mandates and legal requirements for
accountability and responsibility require
additional planning and user training, such as
European Union’s GDPR & Safe Harbor privacy
principles, and U.S. CLOUD Act impact the
adoption of mobile data services
03 Service Models
03.01 Categorizing cloud services
Cloud providers group their offerings into three primary “aaS” categories according to their level
of abstraction, identified by NIST by these designations
• Software as a Service (SaaS)
• Platform as a Service (PaaS)
• Infrastructure as a Service (IaaS)
Service models
A typical depiction of the cloud service
models, depicting their relationship as a
hierarchical model with each layer consuming
elements of layers lower in the model
Cloud service models aligned with their
principle consuming populations
03.02 Software as a Service
03.03 Platform as a Service
03.04 Infrastructure as a Service
Big Data
General rule-of-thumb application to any data set that cannot be processed in a reasonable
amount of time due to its size or complexity
Traditionally, supercomputers have been necessary to manage big data
Modern data analytics have expanded the potential use for big data into everyday office
environments
03.05 Emerging Cloud
Database as a Service capabilities
Cloud services have not lost access to their
basic functions, and they gain significant
advantages leveraging them in the age of
“big data” through distributed computing
cloud functions and services such as
• Database as a Service (DBaaS)
• Data Mining as a Service (DMaaS)
• Data Warehousing as a Service (DWaaS),
and
• other cloud-specific forms of database
management that are being developed
03.06 Everything as a Service
Many cloud providers also offer other
’as a Services’
These are sometimes described as XaaS
– ’Anything as a Service’, such as
• DaaS – Database as a Service
• DRaaS – Disaster Recovery as a Service
• BaaS – Backup as a Service
• Storage as a Service
…any many more
Vendor Lock-In?
Vendor lock-in and proprietary lock-
in both refer to the condition in
which an organization finds itself
relying on a proprietary technology
base that restricts future migration
to alternative solutions without high
costs for transition of supportive
technologies
Organizations seeking agility must be
careful to manage vendor lock-in
constraints in long-range planning
How to avoid vendor Lock-In?
Summary