Cloud Computing Unit 1
Cloud Computing Unit 1
UNIT I:
CLOUD COMPUTING FOUNDATION Introduction to Cloud Computing - Cloud Computing
Basics - History of Cloud Computing - Importance of Cloud Computing - Characteristics - Move
to Cloud Computing: Pros and Cons of Cloud Computing - Nature of the Cloud - Technologies in
Cloud Computing - Migrating into the Cloud - Seven-step Model. Types of Cloud - Cloud
Infrastructure - Cloud Application Architecture. Working of Cloud Computing: Trends in
Computing - Cloud Service Models - Cloud Deployment Models
Unit II:
CLOUD COMPUTING ARCHITECTURE Cloud Computing Technology: Cloud Lifecycle
Model - Role of Cloud Modeling and Architecture - Reference Model for Cloud Computing-
Cloud Industry Standard. Cloud Architecture: Developing Holistic Cloud Computing Reference
Model - Cloud System Architecture. Cloud Modeling and Design: Basic Principles - Model for
Federated Cloud Computing- Cloud Eco System - Cloud Governance.
Unit III:
VIRTUALIZATION Definition of Virtualization - Adopting Virtualization -Types of
Virtualization - Virtualization Architecture and Software - Virtual Clustering - Introduction to
Cluster - Virtualization Application - Pitfalls of Virtualization. Grid, Cloud and Virtualization:
Virtualization in Grid - Virtualization in Cloud. Virtualization and Cloud Computing : Anatomy of
Cloud Infrastructure - Anatomy of Cloud Computing - Virtual Infrastructures - CPU Virtualization
- Network and Storage Virtualization
Unit IV:
DATA STORAGE AND SECURITY Data Storage: Introduction to Enterprise Data Storage -
Data Storage Management - File Systems - Cloud Data Stores - Using Grids for Data Storage.
Cloud Storage: Overview of Cloud Storage - Data Management for Cloud Storage - Provisioning
Cloud Storage - Data-intensive Technologies for Cloud Computing. Risks in Cloud Computing:
Introduction - Risk Management - Cloud Impact - Enterprise Wide Risk Management - Types of
Risks in Cloud Computing . Data Security in Cloud: Introduction - Current State - Homo Sapiens
and Digital Information - Cloud, Digital Persona and Data Security - Content Level Security (CLS).
Unit V:
CLOUD COMPUTING SERVICES Cloud Services: Cloud Types and Services - Software as a
Service (SaaS) - Platform as a Service (PaaS)- Infrastructure as a Service (IaaS) - Other Clouds
Services . Cloud Computing at Work: Cloud Service Development Tool -
Management/Administrative Services. Tools and Technologies for Cloud - Parallel Computing -
Cloud Computing Application Platform - Cloud Computing Platform - Tools for Building Cloud -
Programming in Cloud. Cloud Tools: VMWare – Eucalyptus – CloudSim – OpenNebula – Nimbus
- Microsoft Cloud Service: Windows Azure Platform - Google Cloud Applications - Amazon Cloud
Services
INTRODUCTION
CHAPTER
TO CLOUD
1
COMPUTING
1.1 Cloud Computing Basics
1.1.1 Introduction
Originally, cloud computing was a hazy term, in the sense computing would occur in remote
locations without the need for human intervention. Certainly, there is no necessity for the users
to know how the computers, their software or the network are functioning.
In the real world, computing developed progressively and can be viewed in two stages. One
is more centralized and the other is the desktop. The limitations of centralized computing did not
give users enough control and was inflexible. Distributed computing made every user a system
administrator but it was still inefficient. In the last few years, as the cost of computing power
continued to decrease, the cost of manpower to implement and manage computer systems have
increased. Centralized computing facility needs more version upgradation to reach the cloud
computing stage. Some computer scientists have suggested a vast grid of computers attached via
the Internet, whose power is combined for large-scale tasks, when needed. In certain cases, large
numbers of computing systems are used for particular tasks. Other scientists have recommended
a computing utility which would offer just as much computing power as a society needs in an
on-demand basis, as in the case of electricity.
Therefore, Google and Amazon web users have built enormous data centres for their own
use. They have realized that they can allow others to access these data centres at reasonable
prices. Thus began the era of cloud computing.
The beginning of what was recognized as the concept of cloud computing can be traced
back to the mainframe days of the 1960s, when the idea of ‘utility computing’ was propounded by
MIT computer scientist and Turing’s medal winner John McCarthy. Utility computing ended up
becoming a thing of large business units like IBM. The concept was so simple that the computing
power could be wrecked down as a metered service for the business, similar to how telephone
companies operate for their consumers.
‘The Computers of Tomorrow’ is an article which was published in Atlantic Monthly in
1964 by Martin Greenberger. He envisioned a future in which computers would become super
powerful worldwide and major companies will be operating through wires all over the place in
the due course of time. The ‘information utility’ would almost immediately grow but the issue
was, “would it become regulated like the power manufacturing unit or be a private body?”. IBM,
of course, foresaw the possibility of massive profit to be made in this type of business, and turned
the wheel of fortune in providing computing services to companies of enormous scale.
Huge organizations (e.g., banks) find it difficult to access computing power from their
enormous mainframes as is too costly and large to run on their own. Once the personal computer
became ubiquitous, the concept of utility computing came to be known as more of an operational
profligacy that most companies did not need. This also awakened the reality that computers were
becoming reasonable and easily accessible.
The other major constraint in the design of utility computing which could shrink the
growth of the usage of personal computer was the technical restrictions on bandwidth as well
as disk spaces. The infrastructure for this type of technology was just not in place until now to
support cloud computation, even though the use of rented mainframe processing still proved to
be beneficial for quite some time.
It was in the late 1990s that companies such as Sun Microsystems decided to introduce
the concept called ‘the network is the computer’. The idea that Oracle founder Larry Ellison
stated was as follows ‘all these ideas were indeed profound but they never failed with consum-
ers, who were looking for more complete personal computer solutions specializing with, some
storage capacity availabilities’. As of now, the personal computer is not a dummy terminal. In
reality, the rise of the Internet, in the mid 1990s, changed the usage of computers and information
distribution. With the idea of utility computing, Amazon began to establish and control server
farms, to offer apps to their buyers.
Essentially, Amazon is far from being a company that specializes in retail. Its assistance to
cloud computing will be discussed shortly in a profile of companies using cloud technology, but
it is clear to any IT expert that Amazon is the first company that built on the basics of technical
innovation, particularly after the dot-com bubble time.
● Each day between 8:00 AM and 9:00 AM, Since when? Till Date, Online Ticket
Booking: IRCTC, India
The bookings and enquiry requests are 6–7 times higher during the peak hours than
the rest of the day. So while the existing infrastructure is well equipped to handle
the daylong traffic, it is the peak hour traffic that clogs servers. (Source: http://www.
techno-pulse.com/2011/01/what-irctc-learn-redbus-cloud-iaas.html)
—What IRCTC can study from cloud?
Similarly, server crashes were reported across India when the online CAT examination was con-
ducted by the esteemed IIMs (Indian Institute of Management) in 2009; although they were
smartly attributed to a virus and not to the number of hits. It points to the fact that the cloud
service without security aspect could also be powerless.
Dynamism
It is quite simple, similar to how you use your mobile phone connection. If you want to talk more,
you will buy a top-up card. If you are a post-paid customer, you will change your plan to meet
your requirement. Your need is dynamism. Therefore, your infrastructure should support your
changing needs.
Abstraction
From an end user’s point of view, they do not have to worry for the OS, the plug-ins, web security
or the software platform. Everything is its place. The business/consumer should focus his atten-
tion more on its core competency rather than distressing himself over secondary resources such
as the OS or the software.
8 INTRODUCTION TO CLOUD COMPUTING
Resource Sharing
The whole architecture should be implemented such that it provides you the flexible environment
where it is possible to share applications as well as other network resources. This will provide
you with need-based elastic architecture, where the resources will grow without any major
configuration modifications.
Open
Reliability Security
Access
Economic Sustainable
Interoperable
Value
6. Privacy: Users’ rights must be clearly defined and allow access based on rights.
7. Economic value: The cloud must provide substantial savings and benefits.
8. Sustainability: The cloud must increase power effectiveness and reduce environmental
impact.
IT Service-centric Approach
Cloud computing is service-centric business. This is in stark difference to more conventional
system- or server-centric models. In the majority cases, users of the cloud usually want to run
some business service or application for an exact timely purpose and they don’t want to get
bogged down in the system and network administration of the environment. They would prefer to
rapidly and easily access a devoted application or service. By abstracting away the server-centric
outlook of the infrastructure, users can effortlessly get access to pre-defined computing environ-
ments conceived especially around their service.
An IT service-centric advance makes customer acceptance and enterprise agility which is
less difficult and speedier. A customer can perform an administrative work, the more expedient,
the enterprise progresses, lessening are the charges or propelling is the revenue.
● Capabilities for configuring, organizing and reporting to make sure resources are allocated
and reallocated to several groups of users.
● Tools must be available for controlling access to resources and policies for resources to be
utilized or operations to be performed.
All of these competencies sanction finance agility while concurrently enacting valued and
necessary administrative power. This balance of power and delegation maintains security
and uptime, reduces the level of administrative efforts and maintains working expenses low, and
releases resources to focus on higher-value projects.
Consumption-based Billing
At last, cloud computing is usage based. Users have to compensate for only for the usage and
consequently they are assured or given an assertion supported on usage basis. Cloud computing
platforms must deliver mechanisms to catch information about the usage that enables that charge
is calculated and that should be integrated into the billing systems.
From a user’s point of view, this scenario helps them in keeping their costs down. From
a provider’s perspective, it allows them to monitor usage for charge calculation and billing
purposes.
In summary, all of these defining characteristics are necessary in producing an enterprise
private cloud capable of achieving compelling business value, which includes savings on capital
equipment and operating costs, reduced support costs and significantly increased business agility.
All of these enable corporations to improve their profit margins and competitiveness in the
markets they serve.
Outsource
Process
Online
Offline Access Storage
Cloud Platforms
Online
Computing
Collaboration
contractual arrangements so that they do not take values from the advantages that have been
accrued. Organizations that are sensitive to their information technology costs have no alternative,
but to consider cloud computing mechanisms.
Figure 2.1 shows the merits of cloud computing and states the importance of migrating to
cloud computing, as it supports/provides the following benefits:
● Online storage
● Accessible in different platforms
● Using online resources
● Online collaboration and
● Easy outsourcing processes
Initially, it is important to recognize that cloud computing is expected to bring in a higher
level of automation than the ordinary systems of communication between the various sections
of an organization. This means that, if you find that a lot of your time is spent doing manual
trouble-shooting or dealing with configuration, then the deal is just not worth it. There are some
organizations that have outsourced their information technology under the cloud computing
scheme but have ended up with more work than ever before. Clearly, this indicates that they made
the wrong decision in choosing to go with cloud computing.
The second element that you should look out for when you implement a cloud computing
initiative is that there should be a level of virtualization of the processes. It means that the activi-
ties should be online. If you find yourself in the position, whereby you have to carry out the activi-
ties in the local vicinity, then you have to recognize that your cloud computing initiative has failed.
18 MOVE TO CLOUD COMPUTING
Users
Service Request Examiner and Controller
Resources
Allocator
Pricing Accounting
Virtual
Machines
Computer
Systems
The company to which you outsource, the functionality must be able to deliver a seamless
service via the Internet or else you have to review the contract. If they do not have the capacity to
do this effectively, you might bring forward a suggestion for sharing costs and profits. Make sure
that at the very beginning of the relationship, these issues are tested and clarified.
A good cloud computing package must only charge you for the services that you use. This
is a fundamental advantage of cloud computing and if the other party cannot deliver then you
really need to consider cancelling the contract. You might find that some providers want you to
have a standing charge that covers their fixed costs.
This might be acceptable if they are providing a particularly excellent service but you must
insist that, there is also an element of variability in the prices depending on how much you engage
the service. If it appears that on a long-term basis, you will not be able to support the contract due
to small usage and then you can consider down-scaling the operation.
Figure 2.2 shows some key elements of cloud computing, without which computing cannot
be established. Elements are divided into four layers. Layer 1 contains the physical machines,
where the required software and operating systems are installed. Layer 2 forms virtual machines.
Layer 3 explains the service level agreements (SLA) and resource allocator to the virtual machines
(VM). This layer also accounts for the job, prices it and dispatches the jobs to the VM. Layer 4
contains the users or brokers using the computing.
No need to buy a program, but entering into a monthly or annual contract is also attractive, as is
the reality that several applications are offered for free.
Though the issue of security cuts both ways, which has been contradictory with the results.
Individually, many small firms do not have the budget to spend on adequate on-site security and
backup systems are subjecting their business data vulnerable to stealing, loss, hackers, power
outages and natural disasters.
Chad Barr, president of CB Software Systems says, ‘Cloud is a very safe way of operating
today and it’s going to get better and better’. On the other hand, the idea that extremely sensitive
data, possibly including trade secrets or confidential legal documents, is not protected up on com-
pany premises but is side-lined anywhere in a cloud disconcerts to numerous business owners.
Easier collaboration: Cloud computing services allow to access any time from any computer, it
is easy to work together with employees in remote locations.
Affordable: With cloud computing, it is possible to reduce operational costs and investment
expenditures on hardware, software licenses and implementation services.
Scalable and flexible: Cloud computing can sanction to maximize supplies for better competence
and lessen unused capacity. It can also scale up or downward to meet the varying demands of the
business.
Efficiency: Cloud computing renders the gain of divided hardware, automated and recognizable
technologies. The employees have the right to use the database from everywhere by using any
PC, mobile device or browser. It also reduces overall energy usage and physical presence.
knows. The latest interface software used in today’s world is Internet Explorer 9, apart from the
previous versions such as Mozilla Firefox and Internet Explorer 8.
E-mail account holders such as Gmail, Yahoo mail and Hotmail will know, what cloud
computing is?. In the latest e-mail working system very well used cloud computing techniques,
due to this salient feature the service’s computer keeps all the software and storage and the local
computer is used to just display the information.
Virtualization Technique
Virtualization works on the management of how the likeness of the OS, middleware and pro-
grams procreated and assigned to a personal system or part of the server stack away.
These technologies in addition helps in reusing certificates of OS, middleware or programs
requests after the customer distributes their service from the cloud computing platform.
Compositional
Operator Contract
Components SOA
Security
Security is an obvious threshold question, if the cloud is not secure, enterprises will not consider
migrating to it fearing their sensitive data will be tampered. The external SAAS providers can
also give satisfaction to the customers in security level, example the sales Force.com is rendering
an excellent feature in Cloud security. It is possible because the public clouds are multi-tenant,
user application could be affected by the vulnerabilities or defects of other neighbours’ code.
Users must ensure that they understand the underlying infrastructure of the cloud to which they
migrate from their clients and must also advise clients to include security in their cloud SLAs
and terms of service.
Vendor Management
As soon as you realize that the cloud is not in your IT platform and it is in the hands of an out-
side firm, how do you guarantee that their technical or business problems won’t become yours?
When the user is going to migrate with the outsource providers, then the service level agree-
ments and its terms are thoroughly checked. While the whole idea behind cloud computing is to
propose a standardized, multi-tenant infrastructure, cloud vendors may not offer the same level
of custom SLAs as IT managers. Amazon’s AWS Management Console, which is a monitoring
interface, offers robust features and helpful to IT Managers.
Subsequently, additional cloud vendors and cloud management start-up firms are springing
up to address cloud needs. At rest, we need to assist clients, so that the cloud services they dial up
are convenient and can be monitored sufficiently to ensure that they will not have interruptions
and performance issues.
Technical Integration
The technical issues are also complex. Now most firms that migrate to the cloud environment
in a hybrid model, are keeping certain key elements of their infrastructure in-house and under
2.4 MIGRATING INTO THE CLOUD 25
their direct control, while outsourcing less susceptible or core components. Integrating internal
and external infrastructures can be a technical concern. A VM template should incorporate
infrastructure, application and security to fullfill the need of the user. Like Force.com and
Salesforce.com’s cloud offering, is leading the way by integration as a service on top of its cloud
contributions.
● Will the cloud-based solution work in segregation or work with other systems?
● Is the planned solution part of a recognized cloud platform?
● How many customers will access the cloud? What are the training and support levels
necessary?
● What is the total lifecycle cost of the solution and reason?
● Does the ‘pay-per-use’ model improve our cash flow?
1. Plan
● Determine key business drivers
● Define business objectives
● Get executive sponsorship
● Set project guiding principles
● Form project team made up of IT and business representatives
Develop a project plan by including the following:
● Define business requirements
● Set key success metrics
● Set timeline
● Identify decision-making authorities
2. Execute
● Execute the plan
● Stay away from ‘scope creep’—stay focused on original project scope; this becomes a
challenge particularly in cases, where a major legacy application with large users set is
being replaced
● Remember to follow the guiding principles at all times
2.4 MIGRATING INTO THE CLOUD 27
3. Monitor
● Monitor adoption
● Track success metrics
● Stay away from scope creep (this one may well decide the success or failure of the project)
● Follow guiding principles
● Only implement changes based on quantifiable business needs
However, you are probably worried about the problems and costs associated with the transition.
Unless a company is smaller in size, migrating to the cloud can be a painful, labour-intensive
process that opens you to many new risks. Fortunately, it does not have to. A little foresight and
planning will go a long way. The below given five steps are very essential to reach migration and
achieve ROI.
Start small: The latest trend is that people end up buying into the hype, hastening into full-
scale projects as well, soon and forgetting to bring common sense along for the ride. Slow
down, define your goals, identify potential obstacles and define what being cloud-enabled will
do for your organization in the long run. As with any new trend of technology, it is important
to verify the waters before leaping into it heads on. Like most of the organizations, if you
don’t have the skills and necessary knowledge to make fully informed decisions about how to
handle identities, enforce application right to use, guard against data leaks, update software
licenses and safeguard investments in inheritance hardware and software. One must be ready
to identify a few easy applications to shift that will distribute immediate benefits from being
cloud enabled. Start with the ideas such as, e-mail and messaging and use them as test cases for
further implementation.
Trust cloud vendors to protect data: The weak point of cloud is its security. It actually can be
cloud enabled and people can parse out the new risks and opportunities. Improvement in security
features with respect to data protection helps the cloud providers to deliver their service effec-
tively. Large cloud providers have the resources to tackle data protection in depth. They can try
various approaches to provide best solutions. This trial-and-error method could help to improve
the fault tolerance.
28 MOVE TO CLOUD COMPUTING
Importance of security features: Many cloud providers should deliver good job of protecting
data but not all. As new providers pop up almost daily, it is important to do a comparison of
these features, as follows: Do they have good security processes in place? Do they have both
perimeter-based and behaviour-based security tools? Will they protect you against data leakage
and IP theft? Do they have solid business continuity and disaster-recovery plans in place? Have
they been hit with recent attacks and if so, how did they recover from them?
For example, the Google server had an attack before, although there is no publicly avail-
able evidence as to who was responsible, the fact that user accounts of Chinese’s dissidents were
breached. How did Google respond? They have applied many approaches. Among them, two are
very important, they are:
1. They immediately brought in the NSA to help them address the problem of foreign security
services penetrating their defences
2. They publicly discussed the attacks
Be an identity provider: There is one thing cloud providers cannot handle for customer that is,
the integrity of their users. By definition, enterprise identities must be defined (and preferably
handled) by the enterprise. You have to convey your cloud provider, whom to let in and what
privileges each person should receive. You also have to define the mechanisms by which authen-
tication, access and roles will be enforced.
Due to many reasons cloud computing got a bad reputation, in terms of security, because
developers forgot about the importance of identity, with cloud-enabling different applications.
This is not a fundamental flaw in the cloud model rather it is an age-old story of developers not
thinking through the security implications of a new computing model. To protect sensitive data
in the cloud, absolute verification of user’s identity is very essential.
Plan for latency and outages: Latency and Outages are other two lapses for cloud other
than security. The cloud providers are aware of these problems and are busily solving them.
Nevertheless, when you pick applications to move to the cloud, you can not overlook the
problems that arise when you rely on delivery over the public Internet. If you are running a large
enterprise, you may have WAN optimization or route steering tools in your venture. With these
directory services, it would be hasty to discard those investments. Keep latency-sensitive appli-
cations in-house and implement a hybrid cloud model.
You also need to have in-depth disaster recovery and backup plans that include how
to overcome the situation when cloud provider is down. Another time, cloud providers are
possibly better positioned to deal with outages than you, but most of the foremost cloud pro-
viders have suffered through a significant outage at one time or another. With its guarantee
to cut costs and simplicity of scalability, the attractions of cloud computing for IT managers
are straightforward, but the silver lining still eludes some enterprises unwilling to release
sensitive data.
Who wins depends on the platform that has the most popular applications? Although this is
far off from the enterprise market, which is more mature and hence homogenous, conservative
and geared for efficiency rather than novelty. As for this, the efforts of leading enterprise soft-
ware firms such as SAP, Oracle, Siebel and the rest have become cloud-compliant and cautious
at best.
Know that there are many different variances of cloud services: The term ‘cloud’ has turn out to
be overloaded and now broadly characterized as a service-delivery model that can be applied to
a range of services around multiple stage of IT: public and private variants. The discussion over,
what comprise a cloud occupied a great deal of conversation in the earlier period? It is implicit
that the significant first step is to become knowledgeable on the various cloud options and their
shades.
Move towards the cloud as a tool or an additional option to supply IT functionality: Those who
have effectively leveraged cloud technology have done so in a practical or opportunistic fashion
rather than view cloud as some sort of computing model—‘build it and they will come’. Think
of cloud contributions as tools or alternative solutions to definite course of actions.
For example, in the storage space, an organization to address different service requirements
may deploy multiple tiers of storage relating to performance and availability. Cloud storage can
be viewed basically as one more option for addressing a set of requirements for one or more tiers.
This provides a perspective from which rational conclusion can be made.
Recognize which constituent of your environment may be ‘cloud compatible’: The environment
is not uniform in providing cloud services. It depends on the compatibility of the region in the
environment. Some key factors that might restrict cloud compatibility are as follows:
● Hardware dependencies
● Governance and regulatory restrictions requiring controls, location of data or comprehen-
sive chain-of-custody monitoring is probably excluded from the cloud
The objective should be to identify application and functional areas that fit a shape and have
requirements that support well with the capabilities of a cloud service.
To better compute the advantage of cloud services lies on understanding about current costs: The
most important attraction of the cloud is more cost-effective in delivering required IT functions.
Unfortunately, many start their examination of cloud options without exactly understanding their
present cost composition. When a cloud solution provider offers service costs based on usage,
internal IT personnel struggle to classify their present costs and make them impossible to accu-
rately compare or assess the differences.
To deal with this, IT organizations have started to think and work more like a service pro-
vider. They should be able to describe their help as services based on attributes such as business
value, compliance, security, availability and performance. Technology options should be tied
up to service offerings and the costs associated with those services. This approach can help out
to force more proficient deliverance of IT services and raise user fulfilment, whether a cloud
approach is eventually pursued or not.
Preparation of organization to ‘manage’ rather than ‘operate’: The majority of IT organizations
are technology-focused rather than service-focused. They are driven by identifying new technol-
ogies and opportunities for incorporating them into their location rather than evaluating present
service and efficiency gaps and then addressing these shortcomings. As a result, while they can
articulate technical speeds and feeds, they are often foiled when an executive, having heard a
pitch from a cloud seller, asks them about incremental unit cost and run rate.
An IT organization must be designed to offer infrastructure ‘services’ aligned with business
requirements in the future. Many organizations accomplish this by combining delivery methods
including the cloud. IT should be equipped to administer the entire group, regardless of whether
a service is offered internally or externally.
SUMMARY 33
SUMMARY
❖ Cloud computing can empower the unfailing flow of knowledge between the service
provider and the end user.
❖ The pay as you go model of cloud computing adds ample reservation to the company’s
portfolio.
❖ Cloud computing is delineated as the enterprise of sharing some programs from the
‘cloud’.
❖ Cloud computing adopts Internet-based services to support enterprise processes.
❖ It is important to know about cloud computing before making the decision to progress
the enterprise in ‘the cloud’.
❖ The interconnectivity of computer servers is the first constituent that identifies cloud
computing.
❖ Cloud computing can alleviate the appropriate organization technical knowledge
resources within the organization.
❖ Characteristic of the cloud computing is that it sanctions outsourcing company’s work
portfolio, which is the key component.
❖ Cloud computing is expected to carry in a higher stage of automation than the common
procedures of making acquaintance between the assorted sections of an organization.
TYPES OF CLOUD
CHAPTER
3
3.1 Public and Private Cloud
Clients
Application
Platform
Infrastructure
Servers
One can get cloud computing infrastructure for his business, within the following five steps:
1. Choose on-demand technology which will be the foundation for your infrastructure.
2. Determine how your employees can access information from the infrastructure.
3. Prepare the infrastructure with the necessary software and hardware.
4. Set up each computer to access the infrastructure.
5. Integrate all aspects of the infrastructure so that all employees can participate in resource sharing.
Setting up a cloud computing infrastructure is an investment but improved efficiency will
make it worthwhile.
Scale
The potential offered by cloud computing is nearly unlimited in scalability. For this purpose,
some application design guidelines are discussed as follows:
Start simple: Avoid complex design, optimizations for simplicity and performance enhance-
ments. It is a good idea to start with easiest application and checks the scalability of the cloud.
Split application functions and couple loosely: Separate systems should be utilized for different
parts of program functionality and bypass the synchronous attachments between them.
Deployment cluster: Rather than a single system to serve all users, consider forming multiple
clusters, each processing a subtask of an application. This is often called as ‘sharing’.
The advantages of cloud computing in terms of scalability are as follows:
● Inexpensive testing
● Reduced risk
● Ability to segment the customer base
● Auto-scaling based on the application load
Fail
Sometimes and at some point, an application will fail. Some follow-ups should be considered
while designing on-premise or SaaS application such as ‘doomsday’ scenarios.
SUMMARY 43
Get back up quickly: The launching of new application clusters in order to recover data quickly
must be automated.
Data considerations: When an application fails, data persistence and system cannot be ascertained.
It is advisable to move all data to persistent storage and confirm it is replicated and distributed to
ensure data preservation. The system state is restored and used for the recovery process, and thus
the system can be restarted from the point of failure.
Manage
The management of making the deploying cloud applications as virtual appliances is very easy.
The software which is needed for the entire lifecycle in the cloud should be brought by the appli-
ances. Managements workload is reduced because of deploying applications in cloud. It should
be developed in a systematic and consistent manner.
Operating system and middleware interface needs are to be combined while building
appliances. The management system performs a vital role in the testing and deployment process.
By automating the management and creation of appliances, one can tackle the most difficult and
expensive problem called variability. Variability is removed from the release management and
deployment process by producing a consistent appliance image. Chances of mistakes are reduced
due to removal of variability.
The advantages of designing the application in the cloud include the following:
● Cost reduction
● Reduced overheads
● Eliminates application sprawl
● Reduces the chance for errors
SUMMARY
❖ Cloud computing is advantageous for organizations to advance their IT functionality
without augmenting surplus infrastructure and software.
❖ Cloud computing can be classified into four types based on the location where the cloud
is hosted.
❖ Cloud computing offers six types of enterprise services.
❖ Public cloud is charged on a monthly basis.
❖ Private cloud is deployed in the client’s premises with all needed hardwares and OS.
❖ Private cloud architecture does not demand heavy investment, it can be assembled on a
limited budget and also deploying of architecture is not hard.
❖ Cloud storage advantage is its scalability options.
❖ The private clouds are installed within the firewall and are accessible using an Ethernet.
❖ The only limitation to public cloud accessibility is the Internet.
❖ Cloud computing infrastructure for enterprises can be done in five steps.
WORKING OF CLOUD
CHAPTER
4
COMPUTING
4.1 Trends in Computing
03
Percentage Currently Investing
08
07
12 10 05
13
09
14 11
15
16
The X-axis labelled ‘percentage with technology in place’ represents the rate of adoption.
The vertical axis is labelled ‘percentage currently investing’ represents the rate of investment.
In this analysis, the terms ‘low’ and ‘high’ are relative to the technologies that are being
developed. In the figure, the diagonal line represents technologies falling from low investment
and adoption to high investment and adoption rate. Technologies falling in the upper right corner
are more matured.
Figure 4.1 represents a chart with nine different parameters such as low, moderate and high
rate of investment; and low, moderate and high rate of adoption. Each technology falls in any one
of the nine parameters.
● High rate of investment/adoption: ERP, business intelligence systems, CRM systems and
enterprise collaboration falls under this sector.
● Moderate rate of investment/high rate of adoption: Systems like human resource manage-
ment systems (HRMS) fall in this sector.
● High rate of investment/moderate rate of adoption: When there is an increase in investment
than the adoption, it results in growth of technology. Windows 7 falls in this sector.
● Moderate rate of investment/moderate rate of adoption: Technologies such as legacy
system renewal, SaaS and unified communication fall in this category. These technologies
will grow in a slow and steady pace.
● High rate of investment/low rate of adoption: Mobile applications falls in this sector, which
has high rate of investment, but adoption rate is minimal.
● Low rate of investment/moderate rate of adoption: Supply chain management falls in
this sector.
● Low rate of investment/low rate of adoption: Technologies like virtualization (desktop),
tablet, IaaS, environmental management solutions and PaaS fall in this sector. When a tech-
nology has more capability, but adoption rate is low, then organizations will not be inter-
ested in adopting them.
Cloud computing technology changed its focus from industry to real-world problems. The
major trends that emerged in cloud computing technology are:
● Small, medium business and micro-business
● Supply chains management, media and digital content, and legacy systems
● On-the-fly access
● Hybrid cloud model
● Growth in stack-as-a-service
media using client-side virtualization concept. The virtual desktops that conceive a ‘thick client’
likeness by a ‘thin client’ consignment form a long, flexible workforce which decreases com-
plexity and simplifies measures in alignment, review and command by adopting to new client
virtualization.
Data Growth
According to Gartner, enterprise data growth is expected to increase more in the next five
years and 80% will remain unstructured. Due to this trend in the IT, the complexity will also
increase, despite continued budget constraints. More access will lead to more data, resulting
in increased compliance, backup, audit and security. To keep up with the tide, companies must
virtualize storage quickly, preparation of reduplication, calculate all data inputs, keep up the
needs, segments and prioritize data. Thin provisioning, data reduplication, automated tiering,
HSM (heterogeneous storage management) principles and virtual tapes are included in the key
technologies to manage the data growth.
PaaS IaaS
SaaS
SaaS
Provider of SaaS has full administrative rights for its application and responsible for activities
such as deployment, maintenance and update. This type is suitable for customers, who want
less management hassles and worries regarding installation of application, software and its
updation.
Figure 4.3 shows the levels of rights between the subscriber and the provider, i.e., SaaS
component stack and scope of control. From the figure, it is clear that a cloud provider has total
control over the hardware, middleware and operating system. It also has administrative control
over the application residing in the server. Cloud subscriber subscribes the service, it has limited
admin and user level control. Cloud users do not have control over the OS or the hardware.
SaaS subscribers can be individual users, users from organizations and users from enter-
prises. If the focus in on improving of the business, SaaS is the best option.
Component Stack
Cloud Subscriber
Application
Cloud Provider
Hardware
By opting SaaS, replacing of old hardware and maintaining infrastructure can be avoided,
thus saving on time and cost of hiring of technical staff.
Applications, which supports productivity and collaboration are the best options. For
example, Google Apps. Other examples are as follows:
● Online project management apps such as Zoho Mail, Deskaway.
● CRM apps such as Salesforce.com, Impel CRM and Microsoft Dynamics.
● Cloud services such as Skydrive, Google Docs and Dropbox.
● Small and medium enterprises (SMEs)/small and medium business (SMBs) can user
services such ase EazeWork.
PaaS
PaaS is service, where application/software can be build, tested and deployed as a single unit.
PaaS is useful for application builders, developers, deployers and testers.
Figure 4.4 depicts rights of control between the subscriber and provider, i.e., PaaS
component stack and scope of control. From the figure, we can understand that the cloud provider
has total control over the hardware and operating system, admin control over the middleware and
no control over the application. A cloud subscriber subscribes to the services and has full admin
rights over the application deployed and minimal rights over the middleware. Cloud users do not
have control over the OS or the hardware.
PaaS consists of environment for developing applications, languages for writing programs,
compilers and tools for testing and deployment.
PaaS subscribers can be third party software vendors, individual developers and IT service
providers.
Users can opt for PaaS, if his/her focus is only on application development and to finishing
it before the deadline.
By opting PaaS, everything else (other than the application development) will be main-
tained by the provider.
Customers must choose the PaaS based on the platforms they work.
PaaS providers in India are Wolf Frameworks and OrangeScape. Developers working on
PHP can choose PHP Fog or/and CloudControl.
Operating System
No Control
Total Control
Hardware
Component Stack
Application
Cloud Subscriber
Cloud Provider
Hardware
IaaS
When the customer requires an end-to-end infrastructure such as computer resources, storages
and network, he/she can opt for IaaS. The usage fee is billed at CPU hour, size (GB) of data
accessed or stored/hour, bandwidth consumed, etc. Figure 4.5 depicts the IaaS component stack
and scope of control.
Figure 4.5 depicts the rights of control between a subscriber and a provider, that is, IaaS
component stack and scope of control. From the figure, it is clear that cloud provider has total
control only over the hardware and has admin rights for virtualization part, that is, hypervisor. He/
she has no control over the application, middleware and guest operating system. Cloud subscriber
subscribes the service and has full admin rights for the application deployed, middleware and the
OS. Cloud users can make requests to hypervisor but don’t have control over the hardware.
Enterprises comprising of many servers can act as an IaaS provider such as Facebook,
Orkut and Twitter.
IaaS is very useful for beginners, who are not in a position to predict the success rate of
their application. IaaS customers can choose between different OS, databases and platforms.
IaaS providers in India are Amazon, Rackspace, Joyent, GoGrid, Verizon Teeremark and
Rightscale. NetMagic Solutions and InstaCompute (from Tata Communications).
Services
Application
Platform
Infrastructure
Management
Hybrid Off-premises
SaaS IaaS IaaS
IaaS SaaS
PaaS SaaS Public/External
Private/ Public/Internal
Internal PaaS
PaaS
The public and private cloud concepts are important because they support cloud computing.
While working on the cloud, the user may not have to know about the technology or where
about of the service provider’s infrastructure. Cloud also supports resources in terms of dynamic,
scalable, virtualized versions by paying some fee.