0 ratings0% found this document useful (0 votes) 69 views51 pagesCloudComputing Unit 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
and Infrastructure
Cloud Architecture Models
IF Syllabus
Cloud Architecture : System Models for Distributed and Cloud Computing - NIST Cloud Computing
Reference Architecture - Cloud deployment models - Cloud service models; Cloud Infrastructure;
Architecturé
Design of Compute and Storage Clouds - Design Challenges
Contents
1.1. History of Cloud Computing s+, Dec.-20,21,22,
1.2. System Models for Distributed and Cloud Computing
1.3 NIST Cloud Computing Reference Architecture
1.4 Cloud Deployment Models vecrees, Deo+21,22,
1.5 Cloud Service Models
1.6 Software as a Service (SaaS) . Dec.-22, °
1.7. Platform as a Service (PaaS). Dec.-20,
1.8 Infrastructure as a Service
1.9 Identity as a Service
1.10 Cloud Infrastructure : Architectural Design of Compute
and Storage Clouds vive, Dec-22,
1.11 Migrating into the Cloud
1.12 Two Marks Questions with Answers
Marks 13
Marks 13
Marks 13
Marks 13
Marks 5
=
(1-1)Cloud Computing
History of Cloud Computing
f-2 Cloud Architecture Models and Inf
Idea of cloud computing was introduced by computer acenneY John
publ aly in 1961, Then in 1968, Leonard Kleinrock, a chief scientist of
ARPANET project comments about Internet.
The general public has been. leveraging forms of Internet-based computer Util
since the mid-1990s through various iricarnations of search engines, e-mail servicg
open publishing platforms and other types of social media. !
these services popularized and validated core concepts,
Though consumer-centric,
b ud computing. The Salesforce.com provide,
that form the basis of modern-day clo
remote service from 1990 to organizations.
Amazon launched its web services in 2002 and it provides services jp
organizations for storage and remote computing. Cloud computing definition as
per Gartner "a style of computing in which scalable and elastic IT-enableq
capabilities are delivered as a service to external customers using Intemet
technologies’.
In 2008, Gartner's original definition of cloud was changed. In the definition,
"massively scalable" was used instead of "scalable and elastic.”
NIST definition of cloud : Cloud computing is a pay-per-use model for enabling
available, convenient, on-demand network access to a shared pool of configurable
computing resources (e.g, networks, servers, storage, applications, services) that
can be rapidly provisioned and released with minimal management effort ot
service-provider interaction.
The above cloud definition was published by NIST in 2009, followed by a revised
version after further review and industry input that was published in Septembet
of 2011
Cloud computing refers to a variety of services available over the Internet that
deliver compute functionality on the service provider's infrastructure
Its environment (infrastructure) may actually be hosted on either a grid of utility
computing environment, but that doesn't matter to a service user.
EREE introduction to Cloud Computing
Che
loud computing refer to a variety of services available over the Interet
deliver compute functionality on the sei
vice provider's infrastructure.
grid or welll
Its environme
computin; a. (infrastructure) may actually be hosted on either a
8 environment, but that doesn't matter to a service user.Bae EAP UE apt
‘ Bena ett sy
¢ In other words, this is a collection/group of integrated and
software and Internet infrastructure (called a platform),
* Cloud computing refers to applications and services that run on a distributed
network using virtualized resources and accessed by common Internet protocols
and networking standards.
* Fig. 111 shows cloud symbol. It
denotes cloud boundary.
© Using the Internet for communication
and transport provides hardware,
software and networking services to
clients.
* These platforms hide the complexity and
details of the underlying infrastructure
from users and applications by
providing _ very simple graphical
interface or API.
Fig. 1.1.1 Cloud symbol
* In addition, the platform provides on demand services that are always on
anywhere, anytime and anyplace. Pay for use and as needed.
* The hardware and software services are available to the general public, enterprises,
corporations and business markets.
resources :
¢ IT resources are of two types : Software based and hardware based.
* Software based resources are virtual server, custom software program and
hardware based means physical server and networking devices
* IT resources include server, virtual server, storage device, networking device,
services and software programs.
* An on-premise IT resource can access and interact with a cloud-based IT resource.
* An on-premise IT resource can be moved to a cloud, thereby changing it to a
cloud-based IT resource. :
* Cloud provider : A person, organization, or entity responsible for making a
Service available to interested parties. When assuming the role of cloud provider,
an organization is responsible for making cloud services available to cloud
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgeCloud Architecture Models and Inf
: 1-4
ice Level Agreement (SLA) guarantees,
d upon Service
consumers, as per agree
provider have their own IT resources.
i
© Cloud consumer : A person or organ
i Pri
i d_ uses service from, Cloud
ena id service.
zation that maintains a business relationg
oviders. The cloud consumer uses a loys
service consumer to access a clou:
« Cloud service owner : The person or organization that legally owns a cloyg
service is called a cloud service owner. The cloud service sie —_ be the cf loud
consumer, or the cloud provider that owns the cloud within which the cloug
service resides.
Resource administrator : Cloud resource administrator is the person op
organization responsible for administering a cloud-based IT resource. The cloud
consumer or cloud provider, or even third-party organization could be a cloud
resource administrator
Cloud types :
* Most people separate cloud computing into two distinct sets of models
1. Deployment models : This refers to the location and management of the
cloud's infrastructure.
2. Service models : This consists of the particular types of services that you can
access on a cloud computing platform.
* Fig. 11.2 shows NIST cloud computing definitions
Deployment
models
Cc Public
pores { Inastructure as Platform as a Software as a
a Service (laaS) Service (PaaS) Service (SaaS)
Service
e Resource Pooling
2 Broad network access
Measured service) [On-demand selt-service)| Rapid easto®)
Fig. 1.1.2
service : A client ¢, A 7
lient can provision computer resources without
servic
ice provider personnel
nety ce58 to re the
ork using standard my ee '© resources in the cloud is available ove
ethods ina manner that provides patorn inn
eaCloud Computing 1-5 Cloud Architecture Models and Infrastructure
access to clients of all types. This includes a mixture of heterogeneous operating
systems, and thick and thin platforms such as laptops, mobile phones, and PDA.
* Resource pooling : A cloud service provider creates, resources that are pooled
together in a system that supports multi-tenant usage. Physical and virtual systems
are dynamically allocated or reallocated as needed.
+ Rapid elasticity : Resources can be rapidly and elastically provisioned
« Measured service : The use of cloud system resources is measured, audited, and
reported to the customer based on a metered system.
Cloud Components
* Cloud computing solutions are made up of several elements. Fig. 1.1.3 shows
cloud components.
Data centers
Client computers
\
Ny
Distributed servers
Fig. 1.1.3 Cloud components
1. Clients : Mobile, terminals or regular computers.
2. Benefits : Lower hardware costs, lower IT costs, security, data security, less
power consumption, ease of repair or replacement, less noise.
3. Data centers : Collection of servers where the application to subscribe is
housed. It could be a large room in the basement of your building or a room
full of servers on the other side of the world
TECHNICAL PUBLICATIONS® - an uo-thrust for knowledgeCloud Computing
1-6
4, Virtualizing servers
virtual servers to be
5. onaenee servers : Servers don't all have to be nies in the a location,
" Tt can be in geographically disparate locations. If something va to happen a
one site, causing a failure, the service would still be accessed through anothe |
site. If the cloud needs more hardware, they can add them at another site, |
+ Software can be installed allowing multiple instance,
used and a dozen virtual servers can run on one a
1.1.3 | Characteristics of Cloud Computing
a
On-demand self-service : A consumer can unilaterally provision computing
capabilities, such as server time and network storage, as needed without requiring
human interaction with each service's provider.
Ubiquitous network access : Capabilities are available over the network and
accessed through standard mechanisms that promote use by heterogeneous thin or
thick client platforms
. Location-independent resource pooling : The provider's computing resources are
pooled to serve all consumers using a multi-tenant model, with different physical
and virtual resources dynamically assigned and reassigned according to consumer
demand.
Rapid elasticity : Capabilities can be rapidly and elastically provisioned to quickly
scale up, and rapidly released to quickly scale down.
Pay per use :
Capabilities are charged using a metered, fee-for-service, of
adv
ertising-based billing model to promote optimization of resource use
ERE Role and Boundaries in Cloud Computing
Organizations and humans can assume different types of predefined roles
depending on how they relate to and/or interact with a cloud and its hosted IT
Resources. The cloud computing defines these roles and identifies their mail
interactions.
1. Cloud provider :
A person, organization or enti
stable ©
; ty responsible for making a service available
interested parties. When assum
cae
‘ing the role of cloud provider, an organization *
ervices available to cloud consumers, as pet a8
upon Service Li wn
eS evel Agreement (SLA) guarantees. Cloud providers have their ©
Fig. 1.14 shows cloud provider.
TECHNICAL PUBLICATIONS® . an up-thrust for knowledgeCloud A '
Cloud
service
Cloud consumer Cloud provider
Fig. 1.1.4 Cloud service and cioud service consumer
A cloud provider would have a significant number of roles responsible for the
management of its cloud resources including those responsible for selling,
onboarding, configuring and supporting cloud services for its consumers.
2. Cloud consumer :
* A person or organization that maintains a business relationship with and uses
service from, cloud providers. The cloud consumer uses a cloud service consumer
to access a cloud service.
* Anyone who purchases a cloud service is a consumer and within the consumer
there could be an array of roles responsible for configuring and managing the
resources from the cloud provider depending on the services obtained.
3. Cloud service owner :
* The person or organization that legally owns a cloud service is called a cloud
service owner. The cloud service owner can be the cloud consumer or the cloud
provider that owns the cloud within which the cloud service resides.
* Fig. 1.1.5 shows cloud service owner.
Cloud servic
consumer, Cloud service
owner
Cloud service
owner
Service
cloud X
Cloud
Cloud provider
consumer
Fig, 1.1.5 Cloud service ownerCloud Computing
4, Resource administrator :
1-8 Cloud Architecture Models and
e owner is not called a cloud resource owner is
The reason a cloud servic :
cloud services.
the cloud service owner role only applies to
% Cloud resource administrator is the person or organization responsible
administering a cloud-based IT resource. The cloud consumer or cloud provider
even third-party organization could be a cloud resource administrator.
* For example, a cloud service ow
administer a cloud service.
5. Cloud auditor :
* Cloud auditor is a party that can conduct independent assessment of cloud
services, information system operations, performance and security of the cloud
implementation. Generally, cloud auditors are categorized based on intent.
© For the most part, their focus is on risk and compliance, especially around
information security. Other auditors can provide advisory services especially to
consumers looking to cut down their bills or raise the lev el of efficiency in the
resources consumed.
6. Cloud broker :
© Cloud broker is any entity that manages the use, performance, and delivery of
cloud services and negotiates relationships between cloud providers and cloud
consumers.
* Cloud brokers support consumers to get value for money by playing the advisory
role especially for consumers who have a hybrid mix of resources from multiple
providers.
7. Cloud carrier :
© Cloud carrier is an intermediary that provides connectivity and transport of cloud
services from cloud providers to cloud consumers.
* Most ISPs have taken the role of cloud carriers as they provide the requisite
bandwidth needed to connect consumers with providers as well as capabilities that
support the connectivity.
8. Trust boundary :
+ Logical perimeter that typically spans beyond physical boundaries to represent ti
extent to which IT resources are trusted. Fig. 1.1.6 shows trust boundary.
When analysing cloud environments, the trust boundary is most frequedil
associated with the trust issued by the organization acting as the cloud consumer
TECHNICAL PUBLICATIONS® - an up-thrust for knowledge
mer can contract a cloud resource administrator jywere Serwuury
1-9
Cloud
_consumer_}
Fig. 1.1.6 Trust boundary
Cloud Applications
1, Through cloud cost flexibility, online marketplace gains access to more powerful
analytics online. Cloud takes away the need to fund the building of hardware,
installing software or paying dedicated software license fees.
Greater business scalability enables online video retailer to meet spikes in
demand: Cloud enables businesses not just IT operations to add or provision
computing resources just at the time they're needed.
Greater market adaptability provides online entertainment platform the ability to
reach any type of customer device. A third of the executives we surveyed believe
cloud can help them adapt to diverse user groups with a diverse assortment of
devices,
Masked complexity enables access to services, no matter how intricate the
technology they're built on.
5. With context-driven variability, "intelligent assistants" are possible. "Because of its
expanded computing power and capacity, cloud can store information about user
preferences, which can enable product or service customization,” the report states.
6. Ecosystem connectivity enables information exchange across business partners.
Pros and Cons of Cloud Computing
Pros of cloud computing :
1. Lower computer costs : Since applications run in the cloud, not on the desktop
PC, your desktop PC does not need the processing power or hard disk space
demanded by traditional desktop software
2. Improved performance : Computers in a cloud computing system boot and run
faster because they have fewer programs and processes loaded into memory.
3, Reduced software costs : Instead of purchasing expensive software applications,
you can get most of what you need for free:
TECHNICAL PUBLICATIONS® = an up-thrust for knowledae10 Cloud Architecture Models and jr
1
Cloud Computing
web-based application, you yet
+ When you access a
4. Instant software updates ibadatvup grade
latest version - without needing to pay for or downlo Pe
ibility : You do not have to worry aboys
ent format compatibility + Yo F v
——, machine being compatible with other ye
documents you create on you
applications or operating systems.
6. Unlimited storage capacity : Cloud computing offers virtually limitless storage,
7. Increased data reliability : Unlike desktop computing, in which if a hard disk
crashes and destroy all your valuable data, a computer crashing in the doug
should not affect the storage of your data.
§ Universal document access : All your documents are instantly available fom
wherever you are.
9 Latest version availability : The cloud always hosts the latest version of your
documents; as long as you are connected, you are not in danger of having an
outdated version.
10. Easier group collaboration
Sharing documents leads directly to better
collaboration,
11. Device independence : Move toa
Portable device and your applications and
documents are still available.
Cons of cloud computing :
It requires a constant Internet connection : Cloud computing is impossible if you
cannot connect to the Internet.
2. Features might be limited,
Stored data might not be secure : With cloud computing, all your data is stored
on the cloud, ;
4 Does not work well with low-speed connections
ERE bitterence between Cloud and Traditional Data Centers
Cloud iti
Traditional data centers
Piatt is a virtual resource that helps
businesses to store, organize and operate data wees ese
2p efficiently,
|
I resource that helps |
0 store, organize and operate data |
L Infrastructure (hardware) cost is less,
Infrastructure (hardware) cost is mor.
TECHNICAL PUBLIGATIONs® . ,, Up-thrust for knowledesEB Multitenant Technology
A multi - tenant cloud is a cloud computing architecture that allows customers to
share computing resources in a public or private cloud. Each tenant's data is
isolated and remains invisible to other tenants.
It allows multiple users to work in a software environment at the same time, each
with. their own separate user interface, resources and services. The multitenant
application design was created to enable multiple users (tenants) to access the
same application logic simultaneously.
Multitenancy can describe hardware or software architectures in which multiple
systems, applications, or data from different enterprises are hosted on the same
physical hardware.
Multitenant applications typically include a level of customization for tenants, such
‘as customizing the look and feel of the application or allowing the tenant to
decide on specific access control permissions and restrictions for users.
"Tenants" is a term for a group of users or software applications that all share
access to the hardware through the underlying software. Multiple tenants on a
server all share the memory, which is dynamically allocated and cleaned up as
needed. They also share access to system resources, such as the network controller.
Fig. 1.1.7 shows multi-tenant technology.
Open shared application
and one shared database
aD
Sa
‘Application
1 vatabase
Fig. 1.1.7 Multi-tenant technology
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgeed tenancy on public cloud provi derg
and Google Cloud.
© Multi-tenant architecture is to offer a
Amazon Web Services, Microsoft Azur
. the application, such as :
re, tomize features of the a "
|. User int :
interface. i
ustomize the rules, logic, and workflows 9
lemented in the application.
3, Data model : Tenants can extend the data schema of the application to include
ds in the application data structures.
2, Business process : Tenants can ©
the business processes that are imp
exclude, or rename fiel
4, Access control : Tenants can independently control the access rights for use
and groups.
* Common characteristics of multitenant applications are as follows :
1. Usage isolation - The usage behaviour of one tenant does not affect the
application availability and performance of other tenants.
2. Data security - Tenants cannot access data that belongs to other tenants.
3. Recovery - Backup and restore procedures are separately executed for the data
of each tenant.
4. Application upgrade - Tenants are not negatively affected by the synchronous
upgrading of shared software artifacts.
5. Scalability - The application can scale to accommodate increases in usage by
existing tenants and/or increases in the number of tenants
6 Metered usage - Tenants are charged only for the application processing afd
features that are actually consumed.
7. Data tier isolation - Tenants can have individual databases, tables and schemi
isolated from other tenants.
Benefits of a multitenancy technology :
© Costs savings: It yields tremendous economy of scale for the provider so he &
offer the service at a lower cost to customers,
2, Improved quality,
User satisfaction, and “4
i custo ion : a
application is one hu provide otic
large community hosted by the provider which can gat
3. Improved security : Most ¢
pase
making them vulnerable to
r '
sent enterprise security models are perimetel
inside attacks, x
TECHNICAL PUB) Ina ,,.,Cloud Computing
Smee ry
Cloud Architecture Models and Infrastructure
1. Explain the following challenges in cloud.
i) Security
ti) Data lock-in and standardization.
iti) Fault tolerance and disaster recovery.
NR
drawbacks achieved by it in the banking and insurance sectors.
3. Explain about evolution of cloud computing in detail.
OR ee es
Formulate stage-by-stage evolution of cloud with neat sketch and formulate any three benefits,
ORD
Oa ee
cog
i System Models for Distributed and Cloud Computing
* Large number of autonomous computer nodes are used for building distributed
system and cloud computing. These nodes are interconnected by LANs, WANs or
SANs in a hierarchical manner. Now a days, new technology is applied for
networking. Few LAN switches can easily connect hundreds of machines as a
working cluster. A WAN can connect many local clusters to form a very large
cluster of clusters. tech
* Massive system are formed using LAN and WAN
rem with cluster. Massive
systems are considered highly scalable and can reach web scale connectivity, either
physically or logically.
© Massive systems are classified into four
computing grids and Internet clouds over huge data centers.
Parameters Cloud
Architecture, Virtualized
network size and cluster of servers
connectivity over data centers
via SLA
Control and Dynamic
resources resource
management provisioning of
servers, storage,
and networks
Computer
cluster
N/W of compute
nodes
interconnected
by SAN, LAN,
or WAN
hierarchically
Homogeneous
nodes with
distributed
control, running
UNIX or Linux
groups
Peer to Peer
clusters, P2P networks,
Grid Computing
Network
Flexible network Heterogeneous
of client ‘Clusters
machines interconnected
logically by high - speed
connected by an network links
overlay network over selected
resource sites
Autonomous: comes se
control, serv
client nodes, free SO ith |
in and out, with quthenticated
self - security
organizationCloud Architecture Models and In
Cloud Computing 1-14
See ere ee Most appealing _Distributeg
ete | omure tebe fle sy
; i content
| services computing and computing Hae Gaal global prob
I outsourced search engines 2 solving ang
i computing ‘and web services social networking. oneal
services :
Google search Gnutella, eMule, TeraGrid, UK
ee ee ae BitTorrent, EGEE, D-Grig
Bhiecloud, AWS, SunBlade, IBM Napster, KaZaA, ChinaGrid
Microsoft Azure Road Runner, Skype, JXTA
Cray XT, }
* A distributed system is a collection of independent computers that appears to its
users a single coherent system. A distributed system can consist of any number of
possible configurations, such as mainframes, personal computers, workstations
minicomputers and so on,
* The major milestones have led to cloud computing are mainframes computing,
cluster computing and grid computing.
ERI clusters of Cooperative Computers
¢ Computing cluster consists of interconnected stand - alone computers which work
cooperatively as a single integrated computing resource.
EERE cluster Architecture
* Fig, 121 shows architecture of a typical server cluster. To build a larger cluster
with more nodes, the interconnection network can be built with multiple levels of
Gigabit Ethernet. Using hierarchical construction with SAN, LAN, or WAN, We
can build scalable clusters with an increasing number of nodes
Server - 4
[Server - 2}
Server -N,
Fig. 1.2.1 Architecture of a typical server cluster
TECHNICAL PUBLICATIONS® an up-thrust for knowledge(Cloud Computing 1-15 Cloud Architecture Models and infrastructure
Cluster is connected to the Internet via a Virtual Private Network (VPN) gateway.
The gateway IP address locates the cluster. Most clusters have loosely coupled
node computers. All resources of a server node are managed by their own OS.
Thus, most clusters have multiple system images as a result of having many
autonomous nodes under different OS control.
Single System Image
Single System Image (SSI) is an abstraction that provides the illusion that a
multicomputer or cluster is a single machine. There are individual instances of the
Operating Systems (OSs) running on each node of a multicomputer, processes
working together are spread across multiple nodes and files may reside on
multiple disks.
An SSI provides a unified view of this collection to users, programmers and
system administrators. This unification makes a system easier to use and more
efficient to manage.
Multicomputers consist of nodes, each with its own memory, CPUs and a network
interface. In the case of clusters, each node is a stand - alone computer made of
commodity, off-the-shelf parts. Instead of viewing this collection of computers as
individual systems, it is easier and more economical if users, programmers and
system administrators can treat the collection as a single machine.
Single System Image (SSI) consisting of single entry point, single file hierarchy,
single I/O space, single networking scheme, single control point, single job
management system, single memory space and single process space. The ultimate
goal of SSI is for a cluster to be as easy to use as a desktop computer.
Single job management system: All cluster jobs can be submitted from any node to
a single job management system.
Single user interface : The users use the cluster through a single graphical
interface. Such an interface is available for workstations and PCs.
EE2A Grid Computing Infrastructures
g is a distributed computing system where a group of computers
Grid computin,
computing power, storage,
are connected to create and work as one large virtual
database, application and service.
d software infrastructure that provides
access to high - end
network of computers
a hardware an
Computational grid
computational capabilities. A computational grid is a loose
linked to perform grid computing.
TECHNICAL PUBLICATIONS® - an up-thrust for knowledge© Fig. 1.2.2 shows grid computing: Computer systems
Ms
Grid users:
Grid server / Control node Providers / Resources
Fig. 1.2.2 Grid computing
* In a computational grid, a large computational task is divided up amon
individual machines, which run calculations in parallel and then return results t
the original computer,
* These individual machines are nodes in a network, which may span multiph
administrative domains and may be geographically distant.
* Grid systems are classified into two categories : Computational or data grids and
P2P grids.
Peer-to-Peer Network Families
* The P2P architecture offers a distributed model of networked systems, First, a P
network is client - oriented instead of server - oriented.
+ In a P2P system, every node acts as both a client and a server, providing pat
the system resot A
5 nurces. are simply client computers connected
Internet, All client machines act autonomously to join or leave the system free!
No central coordination or central database is needed ‘
* P2P network does not use i :
a oe olla interconnection network. The phys
‘ork formed at various Internet 40
CEN OAS RUSTON ave for knowledge
-Cloud Computing tte Cloud Architecture Models and Infrastructure
randomly using the TCP/IP protocols. Thus, the physical network varies in size
and topology dynamically due to the free membership in the P2P network.
are built at application layer which is on the top of the
topology. These overlays are used for indexing and peer discovery which
makes the P2P system independent from the physical network topology. Contents
are directly exchanged between the underlying Internet Protocol (IP) networks.
‘orl
Overlay Networks
* Files are distributed in the participating peers. Based on communication or file -
sharing needs, the peer IDs form an overlay network at the logical level. This
overlay is a virtual network formed by mapping each physical machine with its
ID, logically, through a virtual mapping.
* There are two types of overlay networks : Unstructured and structured.
* Structured P2P overlay network topology is a tightly controlled network. The
contents are placed only at es locations but not at random peers. Structured
peer-to-peer overlay networks d Hash Table
(DHT), are scalable networks which supports Internet - scale applications.
© The applications of structured P2P overlays are construction of large - scale
networks, decentralized applications, distributed storage, group communication
and content distribution. The advantage of this overlay is messages correctly reach
the destination even if large number of nodes crashes.
* An Unstructured P2P overlay network has no prior knowledge about the topology
of the network. Here the peers join yspecific rules. A
resource may take a long time for the search operation because most of the time
there is no relation between the name of resources and their locations.
* The advantages of this overlay are : Easy implementation, simplicity, keyword
search and dynamic environments. The major drawback of this overlay is the
scalability problem.
EEZE] PP Application Families
* P2P networks are classified into four groups : Distributed File Sharing,
Collaborative Platform, Distributed P2P and computing P2P Platform.
TECHNICAL PUBLICATIONS®
1n up-thrust for knowledgex Secuty hoes,
by _selfish partners
and peer
‘SETI@home,
Geonome@home
P2P Computing Challenges
Hardware, software and network requirements are three problems face by P2P
computing. There are too many hardware models and architectures to select from
incompatibility exists between software and the OS; and different network
connections and protocols make it too complex to apply in real applications.
Data locality, network proximity and interoperability are three design objectives in
distributed P2P applications.
PaP performance is affected by routing efficiency and self - organization ©
Participating peers. Fault tolerance, failure management and load balancing até
|
other important issues in using overlay networks,
Security, privacy and copyright violations are major worries by those in the
industry in terms of applying P2P technology ;
+ logy in business . In a PoP
network, all clients provide resources inch feat aa |
Bret bandwidth: luding computing power, storage spac
The distributed nature of P2P netwoy
tks also increa
Peer failures do not form a single p cases robui
F stness, because limited
oint of failure,interactive and user a ee Hore
* Cloud allows workloads to be deployed and scaled out quickly through rapid
Epyetoning of virtual or physical machines. The cloud Supports redundant, self -
recovering, highly scalable programming models that allow workloads to recover
from many unavoidable hardware/software failures.
Internet Clouds
* Cloud computing applies a virtualized platform with elastic resources on demand
by provisioning hardware, software and data sets dynamically. Fig. 1.23 shows
virtualized resources from data centers to form an Internet cloud.
Hardware] [ Software
Internet clouds
Network
Paid service
‘Submit
request
Fig. 1.2.3 Virtualized resources from data centers to form an Internet cloud
+ The idea is to move desktop computing to a service - oriented platform using
server clusters and huge databases at data centers. Cloud computing leverages its
low cost and simplicity to benefit both users and providers.
* Machine virtualization has enabled such cost - effectiveness. The cloud ecosystem
must be designed to be secure, trustworthy and dependable.
FEA Cloud Landscape
* Cloud service models are as follows
1. Software as a Service : dispose the applied software unified on
their server, the user'can subscribe applied software service from the
manufacturer through Internet.
2. Platform as a Service (PaaS) : Ha85%kes develop environment as a service to
supply. This layer provides a platform for creating applications
3. Infrastructure as a Service (Iaas) : In this layer, servers, network devices and
storage disks are made available to organizations as services on a need-to
basis.
TECHNICAL PUBLICATIONS® - an un-thrust for knowledge' Cloud Architecture Models and
Cloud Computing pe
et ay and web
* Reasons to adapt the cloud for upgraded Internet eppicon® vig
are as follows : igher energy efficj
1. Desired location in areas with protected space Soe yo
2. Sharing of peak-load capacity among 4 large
utilization.
pool of users, improving Overy
cture maintenance duties from domain -
3. Separation of infrastru SPecife
application development
4. Significant reduction in cloud computing cost,
computing paradigms
. Cloud computing programming and application development
5.
6. Service and data discovery and content/service distribution
7,
8.
compared with tradition,
. Privacy, security, copyright and reliability issues
. Service agreements, business models and pricing policies
E24 Difference between Distributed, Grid and Cloud Computing
Distributed computing Grid computing Cloud computing
‘Small to medium size Large size Small to large size
Low security requirement High security requirement Low security requirement
It is homogeneous It is heterogeneous It is heterogeneous
Network type is private Network type is private Network type is public
It is based on Ethernet It is based on Ethernet It is based on Ethernet
SLA requirement is strict SLA requirement is high SLA requirement is low
1 1.3 | NIST Cloud Computing Reference Architecture
«Fig. 1.3.1 shows NIST cloud computing reference architecture. It defines five ™/
actors : cloud consumer, cloud provider, cloud carrier, cloud auditor and cloud broker
* Each actor is an entity (organization) that participates in a transaction oF process
and/or performs tasks in cloud computing.
Cloud consumer : A person or organization that maintains a business relations?
with and uses service from, cloud providers
det 1 A oe a
Cloud provider : A person, organization, or entity responsible for maki"8
service available to interested parties, i
_Cloud Computing 1-21 Cloud Architecture Models and Infrastructure
omy.) com
i i
§
AERA
ee
‘Aunseg,
Portability /
interoperability
Provisioning /
configuration
Cloud service
management
Cloud provider
Cloud carrier
Service orchestration
control layer
Physical resource layer
Hardware
Resource abstraction and
Service layer
ees S
33 E
os .
8 5
é
Fig. 1.3.1 NIST cloud computing reference architecture
* Cloud auditor : A party that can conduct independent assessment of cloud
services, information system operations, performance and security of the cloud
implementation.
* Cloud broker : An entity that manages the use, performance and delivery of cloud
and negotiates relationships between cloud providers and cloud
services
consumers.
an up-thrust for knowledge
TECHNICAL PUBLICATIONS®EJ cloud Deployment Models
1. Public cloud :
* Examples of public service
* Public cloud benefits ;
‘Architecture Models and Infrag
qe Cloud ret
Cloud carrier : An intermediary that provides connectivity and transport of dloug
* Cloud carrier :
services from cloud providers to cloud consumers. ;
is typically a third - party enti,
Cloud Services Broker (CSB) : The CSB is typ’ J Y op
hee to multiple customers of cloud - pa,
company that looks to extend value to : oa .
services through relationships with multiple cloud service pro acts as
liaison between cloud services customers and cloud service providers, selecting i
best provider for each customer and monitoring the cana A se provides
1, Service intermediation : A CSB enhances a given service by improving som,
specific capability and providing value - added services to cloud consumer,
The improvement can be managing access to cloud services, identity
management, performance reporting, enhanced security, etc.
2. Service aggregation : A CSB combines and integrates multiple services inte
one or more new services. The broker provides data integration and ensures
the secure data movement between the cloud consumer and multiple cloud
providers,
3 Service arbitrage : Service arbitrage is similar to service aggregation except
that the services being aggregated are not fixed. Service arbitrage means a
broker has the flexibility to choose services from multiple agencies. The cloud
broker, for example, can use a credit - scoring service to measure and select an
agency with the best score.
* Cloud deployment models are refers to
cloud’s infrastructure
* Deployment models are defined by the ownership and control of architectural
design and the degree of available customization Cloud deployment models a
private public and community clouds,
Fig. 14.1 shows cloud deployment model. (See Fig. 1.4.1 on next page)
* The cloud infrastructure is made available to the general public or a large indust!
Broup and is owned by an organization selling cloud services,
Public cloud is a eee, ata centre that offers the same services to all its users: T™
services are accessible for everyone and much used for the consumer segment
® ate Facebook, Google and Linkedin
a) Low investment hurdle
b) Good test/developmer
servers,
Pay for what user use,
ay
nt environment for applic ee
‘ations that scale
TECHNICAL PUBI Ioaricp
ie ans ;