Professional Documents
Culture Documents
CSE 6145 Lecture-No.2 (Spring 2019) - Introduction
CSE 6145 Lecture-No.2 (Spring 2019) - Introduction
Spring 2020
Course Outline: Summary
1. Topic 1: Introduction to Cloud Computing
Grading Policy
A (Plain) : 90-100 C+ (Plus) : 70-73
A- (Minus) : 86-89 C (Plain) : 66-69
B+ (Plus) : 82-85 C- (Minus) : 62-65
B (Plain) : 78-81 D+ (Plus) : 58-61
B- (Minus) : 74-77 D (Plain) : 55-57
Overview
• Introduction to Cloud Computing
• Cloud Deployment Models
• Types of Cloud
• Cloud Providers
Introduction
• The term “Cloud” swept on into the scene in recent years and looks like
its a new technology.
• However, it’s just a very nice packaging up of a whole number of
technologies that have actually been with us for some time.
• It can really be thought of as just
Outsourcing the hosting of your applications
Outsourcing the hosting of your physical servers to someone else.
Renting Space and Renting time on someone else’s computers.
• These days, due to huge computational capabilities,
new and fancier technologies have lent themselves of hosting all the more
software and
putting all of the more hardware off-site in the so-called cloud
• So that companies no longer need to host their own physical hardware or
event a whole number of roles in their premises
An Example
Inside of the cloud are things like Routers, and
A running through those Routers are packets, both
TCP/IP, etc.
Laptop
Underneath of this cloud some Transport
Mechanism that gets data from point A (e.g.
Cloud Laptop) to point B (e.g. Web/Email Server, Social
P/IP,
(Router, TC Media site, etc.).
t M ec ha nism, etc.)
Transpor
One can use any number of languages, DBs with
little experiences to get a website up on the
Internet → It’s not that hard initially.
B
However, things start to get hard quickly, if many
Server users hitting the website(s) it’s become difficult
for the servers to handle all of the load (i.e. no.
of users per minute or per unit of time) as there
are finite number of resources e.g. HDD, RAM,
CPU, Code, etc. Example, 1000 users per minute
or second.
An Example (Cont’d)
What is the solution?
A
Increase Capacity - Add Another Server, where in
Laptop both Servers exactly the same software is running .
Laptop Laptop
Cloud Cloud
P/IP, P/IP,
(Router, TC (Router, TC
t M ec ha nism, etc.) t M ec ha nism, etc.)
Transpor Transpor
50 50 50 50
Laptop Laptop
Cloud Cloud
LB LB
1 2 3 1 2 3
What is Cloud?
• It has a huge space that is available online for usage
• It is a collection of data centers that host application
and store data
– Make sure that one can manage all of his/her
applications, recourses, etc. combining all data
centers through a network and
– Give you control to use these resources and
mange them properly.
Cloud Computing
• Uses Internet technologies to offer scalable and elastic services.
The term “elastic computing” refers to the ability of dynamically
acquiring computing resources and supporting a variable workload.
• Data is stored:
– closer to the site where it is used.
– in a device and in a location-independent manner.
As big data cloud computing and internet technology grow, they raise a
new concept of services. This services can interconnect huge number of
online activities.
As per a review from Cisco, the Internet of Things (IoT) is dynamically
expanding the abilities of the cloud.
The major three service models are SaaS, PaaS and IaaS. 28
Software-as-a-Service (SaaS)
• Applications are supplied by the service provider.
• The user does not manage or control the underlying cloud infrastructure
or individual application capabilities.
• Services offered include:
– Enterprise services such as: workflow management, group-ware and
collaborative, supply chain, communications, digital signature, customer
relationship management (CRM), desktop software, financial management,
geo-spatial, and search.
– Web 2.0 applications such as: metadata management, social networking,
blogs, wiki services, and portal services.
• Not suitable for real-time applications or for those where data is not
allowed to be hosted externally.
• Examples: Gmail, Google search engine.
• The user does not manage or control the underlying cloud infrastructure
but has control over operating systems, storage, deployed applications,
and possibly limited control of some networking components, e.g., host
firewalls.
Service
Consumer Service Provider Broker
audit Resource r a
abstraction and Provisioning i
control layer c
Privacy t y
impact audit Physical resource
y
layer Arbitrage
Portability/
Hardware Interoperability
Performance
audit
Facility
Carrier
– The web and the semantic web - expected to support composition of services.
The web is dominated by unstructured or semi-structured data, while the
semantic web advocates inclusion of sematic content in web pages.
– The Grid - initiated in the early 1990s by National Laboratories and
Universities; used primarily for applications in the area of science and
engineering.
– Peer-to-peer systems.
– Computer clouds.
Community cloud
Hybrid cloud
Cloud computing
Infrastructure
Distributed infrastructure
Defining attributes
Resource virtualization
Massive infrastructure
Autonomous systems
Utility computing. Pay-per-usage
Resources
Accessible via the Internet
Compute & storage servers
Networks Services Elasticity
Applications
Presentation
API
Applications
connectivity
connectivity
Abstraction
Abstraction
connectivity
Abstraction
Core
Core
Core
• Systems can span the boundaries of multiple organizations and cross the
security borders.
• Identity fraud and theft are made possible by the unauthorized access to
personal data in circulation and by new forms of dissemination through
social networks and they could also pose a danger to cloud computing.
• Clouds are affected by malicious attacks and failures of the infrastructure, e.g.,
power failures.
• Such events can affect the Internet domain name servers and prevent access
to a cloud or can directly affect the clouds:
• in 2004 an attack at Akamai caused a domain name outage
and a major blackout that affected Google, Yahoo, and
other sites.
• in 2009, Google was the target of a denial of service attack
which took down Google News and Gmail for several days;
• in 2012 lightning caused a prolonged down time at
Amazon.
Thank You
References
• Cloud Computing – Architecture, Platform and
Security Issues: A Survey