Cloud Computing Fundamentals


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cloud Computing Fundamentals

  1. 1. @sahniviwww.vikassahni.comCloud 101Vikas Sahni
  2. 2. What‟s Going On?Ubiquitous wireless broadbandDevices that make it easy to connect to the webAffordable servicesLocation Aware servicesPeople Aware services
  3. 3. Some old-fashioned stuff…3We all take these for granted!
  4. 4. Big B to Big BStarted 40 years ago4
  5. 5. Big B to small bStarted 53 years ago5
  6. 6. Big B, small b and C!6Started 55 years ago!
  7. 7. Computer Centers7Since the beginning!
  8. 8. So what does „Cloud‟ really mean?Infinite computing resources on demandNo capital expenditurePay for what you useI pay ONLY for what I use ONLY when I use it withthe ability to SCALE capacity up and down ONDEMAND8
  9. 9. Available in three flavours9InfrastructureAs a Service• Uses VMs• Consumer manages, patchesand monitors machines• Good for Legacy Apps• Not great for scalabilityPlatform Asa Service• Provides APIs• Building Block Services• Provider manages VMs• Requires a migration of apps• Great opportunity for scalabilitySoftware Asa Service• Web Front End to Software• Multi-Tenant• Logical Separation of data• Very little customisation• Commodity
  10. 10. The flavours mean…Source: Microsoft10
  11. 11. SaaSIssuesVersion ControlMulti TenancyLatencyConfigurationData SecurityInternal IT11
  12. 12. IaaSIssuesProvider ExistenceProvisioning TimeUpgradationLocationBandwidthOpen Protocols12
  13. 13. PaaSIssuesAll of the SaaS issuesAll of the IaaS issuesDesign PatternsTest EnvironmentRoll backScaling13
  14. 14. 144 Cloud Deployment ModelsPrivate cloudenterprise owned or leasedCommunity cloudshared infrastructure for specific communityPublic cloudSold to the public, mega-scale infrastructureHybrid cloudcomposition of two or more clouds
  15. 15. 15Common Cloud CharacteristicsCloud computing often leverages:Massive scaleVirtualizationNon-stop computingFree softwareGeographic distributionService oriented softwareAutonomic computingAdvanced security technologies
  16. 16. €10,000machine€1000machineScale-up And Scale-outVolume€500machine# MachinesScale Up€ 500machine€ 500machine€ 500machineScale OutVolume€500machine
  17. 17. Scaling Out1 x 10GB database10 x 1GB databases
  18. 18. Shared IndividualvsBusiness modelArchitectural modelOperational modelRegulatory constraintsTenancy
  19. 19. The Share vs. Isolate ContinuumEconomy of ScaleSimpler ManagementSLA per tenantData SeparationIsolate ShareConsiderations:Business (Time to market, ROI)Technical (Expected tenant size and load)Operation (“Can you guarantee SLA without isolating?”)Regulatory constraints (“Data must be physically separate”)
  20. 20. Multi-Tenant Data Continuum
  21. 21. 21Threat Exposure and Cost EffectivenessPrivate clouds may have less threat exposurethan community clouds which have less threatexposure than public clouds.All else being equal, massive public clouds maybe more cost effective than large communityclouds which may be more cost effective thansmall private clouds.Doesn’t strong security controls mean that I canadopt the most cost effective approach?
  22. 22. 22Cloud Migration and Security ControlsClouds can contain strong security controlsQuantifying security advantages vs. challenges isnot currently possibleReducing the threat exposure and implementingstrong security controls should lead toprocessing higher sensitivity dataThus, strong security controls are necessary forall cloud models (even private clouds)
  23. 23. 23Ownership and Security ArchitecturesClouds typically have a single security architecture buthave many customers with different demandsClouds should attempt to provide configurable securitymechanismsOrganizations have more control over the securityarchitecture of private clouds followed by communityand then publicThis doesn‟t say anything about actual securityHigher sensitivity data is likely to be processed onclouds where organizations have control over thesecurity model
  24. 24. 24Putting it TogetherMost clouds will require very strong securitycontrolsAll models of cloud may be used for differingtradeoffs between threat exposure and efficiencyThere is no one “cloud”. There are many modelsand architectures.How does one choose?
  25. 25. Cloud Ready Workloads25
  26. 26. 26Migration Paths for Cloud AdoptionUse public cloudsDevelop private cloudsBuild a private cloudProcure an outsourced private cloudMigrate data centers to be private clouds (fully virtualized)Build or procure community cloudsOrganization wide SaaSPaaS and IaaSDisaster recovery for private cloudsUse hybrid-cloud technologyWorkload portability between clouds
  27. 27. Why Hybrid Apps?Need to connect back from the cloud to on premise dataHave to provide access to customers behind corporatefirewallsMust remotely manage the cloud platform and on-premise systemsHave to keep a big distributed communicationinfrastructure running as it‟s safety relatedData Privacy and SecurityLegal and Regulatory requirements
  28. 28. The Long Term DriversLarger datacentres can deploy computationalresources at significantly lower costDemand pooling improves the utilization of theseresources, especially in public cloudsMulti-tenancy lowers application maintenancelabor costs for large public cloudsUnparalleled levels of elasticity and agility thatwill enable exciting new solutions andapplications.28
  29. 29. 29The Short Term scenariosSmall enterprises use public SaaS and public cloudsand minimize growth of data centersLarge enterprise data centers may evolve to act asprivate cloudsLarge enterprises may use hybrid cloud infrastructuresoftware to leverage both internal and public cloudsPublic clouds may adopt standards in order to runworkloads from competing hybrid cloud infrastructures
  30. 30. ConclusionSaaS is matureIaaS will see consolidationPaaS is the way forward, will provide theplatform for more and more of SaaSHybrid configurations will be the next stepALL THESE NEED WORK TO TAKEADVANTAGE OF THE PLATFORM30
  31. 31. Secure GlobalOn-demandComputingAlways AvailableCloud Bursting andLoad-balancingGlobal Applicationand Data DeliveryThe Global Cloud
  32. 32. ContactTwitter: @sahniviBlog: www.vikassahni.com32