Cloud fundamentals
Presented by Abderrahmane TEKFI
Technical Engineer
Email : tekfi.Abderrahmane@gmail.com
Agenda Cloud Deployment
Cloud Compute
Cloud Networking
Characteristics and Models
Introduction
Cloud Storage
Introduction
 https://trends.google.com/trends/explore?date=2010-03-20%202017-04-
20&geo=DZ&q=cloud%20computing
Statistics
 https://cloudtweaks.com/2011/02/a-history-of-cloud-computing/
History of the cloud computing
Characteristics
• On-demand Self-Service
• Broad Network Access
• Resource Pooling
• Rapid Elasticity
• Measured Service
 csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
Characteristics
• On-demand self-service:
A consumer can unilaterally provision computing capabilities, such as server time and
network storage, as needed automatically without requiring human interaction with each
service provider.
• Before | After.
Characteristics
• Broad network access:
Capabilities are available over the network and accessed through standard mechanisms
that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones,
tablets, laptops, and workstations).
• Internet for all
Characteristics
• Resource Pooling :
The provider’s computing resources are pooled to serve multiple consumers using a
multi-tenant* model, with different physical and virtual resources dynamically assigned
and reassigned according to consumer demand. There is a sense of location
independence in that the customer generally has no control or knowledge over the exact
location of the provided resources but may be able to specify location at a higher level of
abstraction (e.g., country, state, or datacenter). Examples of resources include storage,
processing, memory, and network bandwidth.
• Multi-tenant : refers to resource sharing in Cloud Computing where any resource
object is reusable in the Cloud infrastructure.
http://eprints.whiterose.ac.uk/80819/1/sose.pdf
Characteristics
• Rapid elasticity
Capabilities can be elastically provisioned and released, in some cases automatically, to
scale rapidly outward and inward commensurate with demand. To the consumer, the
capabilities available for provisioning often appear to be unlimited and can be
appropriated in any quantity at any time.
Characteristics
• Measured service :
Cloud systems automatically control and optimize resource use by leveraging a metering
capability1 at some level of abstraction appropriate to the type of service (e.g., storage,
processing, bandwidth, and active user accounts). Resource usage can be monitored,
controlled, and reported, providing transparency for both the provider and consumer of
the utilized service.
• Capacity plan
• CAPEX OPEX
• Pay as you grow, pay-per-use or charge-per-use
Characteristics
Models
• Infrastructure as Service
• Platform as Service
• Software as Service
• Anything as Service (HHHHH)
Models
Provider : Virtualization, Server, Storage, Network
Customer : Application, data
Where is the OS ?
Example:
https://www.youtube.com/watch?v=AhWHxX3KksQ
Infrastructure as Service
Provider : Virtualization, Server, Storage, Network, OS, infrastructure Software
Customer : Application, data
- Good for developers
- Sample : Windows Azure, Google.
Platform as Service
Provider : Virtualization, Server, Storage, Network, OS, infrastructure Software,
Application
Customer : data
- All we use it 
- Facebook, Gmail, …
Software as Service
- Desktop as service
- Monitoring as service
- VPN as service
- …..
Anything as Service
Cloud Deployment
The cloud infrastructure is provisioned for exclusive use by a single organization
comprising multiple consumers (e.g., business units). It may be owned, managed, and
operated by the organization, a third party, or some combination of them, and it may
exist on or off premises..
Private Cloud.
Private Cloud.
Community cloud. The cloud infrastructure is provisioned for exclusive use by a specific
community of consumers from organizations that have shared concerns (e.g., mission,
security requirements, policy, and compliance considerations). It may be owned,
managed, and operated by one or more of the organizations in the community, a third
party, or some combination of them, and it may exist on or off premises.
- HIPAA, FISMA, SOX
Community Cloud.
• Public cloud. The cloud infrastructure is provisioned for open use by the general
public. It may be owned, managed, and operated by a business, academic, or
government organization, or some combination of them. It exists on the premises of
the cloud provider.
Public Cloud
Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud
infrastructures (private, community, or public) that remain unique entities, but are bound
together by standardized or proprietary technology that enables data and application
portability (e.g., cloud bursting for load balancing between clouds).
Cisco Intercloud Fabric
Hybrid Cloud.
• CIA : Confidentiality, Integrity and Availability
 Confidentiality
Confidentiality is the ability to hide information from those people unauthorized to view it. It is perhaps the most
obvious aspect of the CIA triad when it comes to security; but correspondingly, it is also the one which is attacked
most often. Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data
transferred from one computer to another.
 Integrity
The ability to ensure that data is an accurate and unchanged representation of the original secure information. One
type of security attack is to intercept some important data and make changes to it before sending it on to the intended
receiver.
 Availability
It is important to ensure that the information concerned is readily accessible to the authorized viewer at all times.
Some types of security attack attempt to deny access to the appropriate user, either for the sake of inconveniencing
them, or because there is some secondary effect. For example, by breaking the web site for a particular search
engine, a rival may become more popular.
Public Cloud Security
• Shadow IT
It is when data are stored on public cloud and the IT Staff do not apply Security policies.
• Control of the Cloud :
 Service Admission
 Elasticity control : user who create 1000000 VM
 Data residency : choose where you deploy your services
• Performance Monitoring and management
Public Cloud Security
• Cost :
 loss of revenue : e-commerce example
 Hidden cost, Hidden Workload. (https://gigaom.com/2009/07/17/the-hidden-cost-of-
the-cloud-bandwidth-charges/)
Public Cloud Security
• Cloud computing is a model for enabling ubiquitous, convenient, on-demand
network access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service provider
interaction. This cloud model is composed of five essential characteristics,
three service models, and four deployment models.
• Cloud is a delivery model for computing resources !
So what is Cloud ?
• Cloud is not a product.
• Is not a solution.
• Is not a change of the process.
Misconceptions
End 1st Part
END

Cloud computing

  • 1.
    Cloud fundamentals Presented byAbderrahmane TEKFI Technical Engineer Email : tekfi.Abderrahmane@gmail.com
  • 2.
    Agenda Cloud Deployment CloudCompute Cloud Networking Characteristics and Models Introduction Cloud Storage
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
    • On-demand Self-Service •Broad Network Access • Resource Pooling • Rapid Elasticity • Measured Service  csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf Characteristics
  • 8.
    • On-demand self-service: Aconsumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. • Before | After. Characteristics
  • 9.
    • Broad networkaccess: Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). • Internet for all Characteristics
  • 10.
    • Resource Pooling: The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant* model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth. • Multi-tenant : refers to resource sharing in Cloud Computing where any resource object is reusable in the Cloud infrastructure. http://eprints.whiterose.ac.uk/80819/1/sose.pdf Characteristics
  • 11.
    • Rapid elasticity Capabilitiescan be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. Characteristics
  • 12.
    • Measured service: Cloud systems automatically control and optimize resource use by leveraging a metering capability1 at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. • Capacity plan • CAPEX OPEX • Pay as you grow, pay-per-use or charge-per-use Characteristics
  • 13.
  • 14.
    • Infrastructure asService • Platform as Service • Software as Service • Anything as Service (HHHHH) Models
  • 15.
    Provider : Virtualization,Server, Storage, Network Customer : Application, data Where is the OS ? Example: https://www.youtube.com/watch?v=AhWHxX3KksQ Infrastructure as Service
  • 16.
    Provider : Virtualization,Server, Storage, Network, OS, infrastructure Software Customer : Application, data - Good for developers - Sample : Windows Azure, Google. Platform as Service
  • 17.
    Provider : Virtualization,Server, Storage, Network, OS, infrastructure Software, Application Customer : data - All we use it  - Facebook, Gmail, … Software as Service
  • 18.
    - Desktop asservice - Monitoring as service - VPN as service - ….. Anything as Service
  • 19.
  • 20.
    The cloud infrastructureis provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises.. Private Cloud.
  • 21.
  • 22.
    Community cloud. Thecloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. - HIPAA, FISMA, SOX Community Cloud.
  • 23.
    • Public cloud.The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. Public Cloud
  • 24.
    Hybrid cloud. Thecloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds). Cisco Intercloud Fabric Hybrid Cloud.
  • 25.
    • CIA :Confidentiality, Integrity and Availability  Confidentiality Confidentiality is the ability to hide information from those people unauthorized to view it. It is perhaps the most obvious aspect of the CIA triad when it comes to security; but correspondingly, it is also the one which is attacked most often. Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data transferred from one computer to another.  Integrity The ability to ensure that data is an accurate and unchanged representation of the original secure information. One type of security attack is to intercept some important data and make changes to it before sending it on to the intended receiver.  Availability It is important to ensure that the information concerned is readily accessible to the authorized viewer at all times. Some types of security attack attempt to deny access to the appropriate user, either for the sake of inconveniencing them, or because there is some secondary effect. For example, by breaking the web site for a particular search engine, a rival may become more popular. Public Cloud Security
  • 26.
    • Shadow IT Itis when data are stored on public cloud and the IT Staff do not apply Security policies. • Control of the Cloud :  Service Admission  Elasticity control : user who create 1000000 VM  Data residency : choose where you deploy your services • Performance Monitoring and management Public Cloud Security
  • 27.
    • Cost : loss of revenue : e-commerce example  Hidden cost, Hidden Workload. (https://gigaom.com/2009/07/17/the-hidden-cost-of- the-cloud-bandwidth-charges/) Public Cloud Security
  • 28.
    • Cloud computingis a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. • Cloud is a delivery model for computing resources ! So what is Cloud ?
  • 29.
    • Cloud isnot a product. • Is not a solution. • Is not a change of the process. Misconceptions
  • 30.
  • 31.