Origins from the telecom network<br />Service perspective; network agnostic<br />Focus on inputs and outputs; internal interworking abstracted<br />Overall architecture and interfaces need to be well defined and unambiguous for the model to work<br />Telecom network evolved through a structured manner over the last hundred years<br />Cloud computing is in the process of being “assembled” over the last few years<br />Def:Abstraction of networks, platforms, servers, data, and applications Framework to develop and deliver cost and quality effective IT Services “Cloud computing is a model for enabling convenient<br /> on demand, network access to a shared pool of resources (e.g., networks, servers, storage, applications, services)<br /> that can be rapidly provisioned and released<br /> with minimal management effort or service provider interaction” — Cloud computing model is composed of Five essential characteristics-On-demand self service: (Provisioning on demand) Users can unilaterally provision computing capabilities with minimal human interaction<br />Broad network access: (Ubiquitous internet access) capabilities available over network can be accessed by standard client platforms, such as PCs, mobile phones, PDAs<br />Resource Pooling : (Virtualized resources, location independent) computing resources are pooled to serve multiple consumers using a multi tenant model<br />Rapid Elasticity: (scale capacity up and down) capabilities can be rapidly and automatically scaled up or down to meeting the demand<br />Metered Service: (Usage based billing) resources are transparent and can be monitored, controlled and reported<br />Four deployment models-Private cloud: infrastructure operated solely for an organization; may exist on and off premises<br />Public cloud: available to the public (individuals or enterprises), have mega scale infrastructures<br /> amazon, google, microsoft, IBM, CA/3Tera, vmware, salesforce.com, rackspace, etc..<br />Community cloud: shared infrastructure for specific purpose, mostly governments that share common concerns, e.g., security, policy,<br />Hybrid cloud: composition of two or more of private and/or public clouds bound together with standardized or proprietary technology<br />Three service architectures-Software as a Service SaaS: Consumer applicationsaccessible from various client devices with limited user specific configuration settings. No access or control of underlying cloud infrastructure<br />Platform as a Service PaaS: Platform consisting of programming languages and tools necessary to create, host and manage applications in the cloud. No access to network servers, operating systems and storage<br />Infrastructure as a Service IaaS: Fundamental computing resources including processing, storage, and select networking components needed to deploy and run arbitrary software for systems and applications<br />cloud computing reference model<br />Cloud reference model verticals: User, Vendor, and Provider — Cloud Vendor<br />Has local tax registration and offers services to Cloud User with guaranteed Quality of Experience (QoE) and Quality of Service (QoS) within the framework of an SLA<br />Brokerage and clearing house that has pre negotiated access to one or more XaaS vendors<br />Provides data security and regulatory compliance to the user —Similar to utility and telecom evolution: not only improves service<br />quality but creates new economic opportunities<br />Last mile services to the end user via wired or wireless<br />TargetedtowardSMEsandHomeOffices<br />SaaS: recall the “UC Berkeley” SaaS tradeoff charging model:<br />UserHourscloud.(revenue–Costcloud)≥UserHoursdatacenter .[revenue–(Costdatacenter/Utilization)]<br />IaaS: computing charged per processor hour, storage by GB/month, and transactions by numbers<br />PasS: charging units vary, such as (a) by longer time units, e.g a middleware platform by year, or (b) by number of users accessing the platform<br />Cloud vendors will manage cloud user’s QoS and SLA contracts, and have back-to-back agreement <br />Cloud vendors share revenue with partners and other providers who are part of the value-chain<br />Usage of resources will be measured, rated, and billed at the Point of Interconnection (PoI)<br />economic benefits of cloud adoption<br />Strategic flexibility — Cost reduction — Software availability — Scalability<br />Skills and Staffing — Energy efficiency — System redundancy and data backuplaws of cloudonomics<br />1.Utility services cost less even though they cost more although utilities cost more when they are used, they cost nothing when they are not<br />2.On-demand trumps forecasting forecasting is often wrong, so the ability to react instantaneously means higher<br />revenues, and lower costs<br />3.The peak of the sum is never greater than the sum of the peaks clouds can reallocate resources across many enterprises with different peak periods<br />4.Aggregate demand is smoother than individual aggregating demand from multiple customers tends to smooth out variation<br />5.Average unit costs are reduced by distributing fixed costs over more<br />units of output while large enterprises benefit from economies of scale, larger cloud service providers<br />can benefit from even greater economies of scale Joe Weinman, VP AT&T 2009<br />3<br />Cloud Computing - NYU POLY - Prof. Ravi Rajagopal - Copyright © 2010<br />laws of cloudonomics<br />6.Superiority in numbers is the most important factor in the result of a<br />combat (Clausewitz) In the cloud theater, battles are waged between botnets and DoS attacks. A botnet of<br />100,000 servers each with a Mbps of bandwidth can launch 100 Gbps of attack<br />7.Space-time is a continuum (Einstein/Minkowski) One server for 1000 hours versus 1000 servers for an hour)<br />8.Dispersion is the inverse square of latency Reduced latency — the delay between making a request and getting a response — is<br />increasingly essential to delivering a range of services; to cut latency in half requires not twice as many nodes, but four times<br />9.Don’t put all your eggs in one basket Reliability of a system with n redundant components each with reliability r is 1-(1-r)^n<br />10.An object at rest tends to stay at rest (Newton)<br />A data center is a very, very large object owned by large companies and will stay put Joe Weinman, VP AT&T 2009<br />Definitions — Demand D(t) a function of time in the interval 0 ≤ t ≤ T — A = Average Demand —P = Peak Demand*Note A ≤ P+ — C = Unit cost per unit time for Legacy (Fixed) Capacity — U = Utility premium, i.e., pay per use premium for Cloud<br />Total cost of Cloud = A.U.C.T (pay per use based on A) Total cost of Legacy = P.C.T (Infrastructure in place based on P) a simple analysis follows ..If C=$2 /core CPU With U=2, Cloud rate will be C.U=$4/core CPU<br />If U=1, Legacy and Cloud rates are equal If U<1, Cloud rate is less than Legacy rate<br />If U>1, Cloud rate is more than Legacy rate<br />J. Weinman, AT&T 5<br />economy of cloud – mathematical proof<br />Case 1: If U<1<br />Total cost of Cloud = A.U.C.T since A≤P, A.U.C.T ≤ P.U.C.T since U<1, A.U.C.T < P (1) C T therefore, A U C T < P C T Cost of Cloud < Cost of Legacy<br />Total cost of Cloud = A.U.C.T since A=P, A.U.C.T = P.U.C.T since U=1, A.U.C.T = P (1) C T therefore, A U C T = P C T Cost of Cloud = Cost of Legacy<br />Total cost of Cloud = A.U.C.T since A<P, A.U.C.T < P.U.C.T since U=1, A.U.C.T < P (1) C T therefore, A U C T < P C T Cost of Cloud < Cost of Legacy<br />Virtualizationhasrootsinpartitioningand segmentation<br />•Started with Intel 8086 CPU family of “instruction set architecture” where the 16 bit architecture was logically segmented into registers and memory<br />• Virtualizationfadedintheearly90s,butwas reborn in late 90s, with “vmware” and the introduction of “server virtualization” product<br />• 2000–2008:virtualizationtechnologyboom! •Evolved into a natural “characteristic” of Cloud<br />virtualization – definition<br />Cloud Computing - NYU POLY - Prof. Ravi Rajagopal - Copyright © 2010<br />Virtualization refers to technologies that provide a<br />layer of abstraction between hardware and<br />associated software  Ability to serve multiple users with multiple<br />requirements  Ability to dynamically assign different physical and<br />virtual resources to users on demand  Provides location independence  Can be applied to any infrastructure layer – server<br />(hardware), memory, networks, storage, software: operating systems & applications<br />virtualization – benefits<br />1.Server Consolidation<br />Virtualization consolidates multiple systems onto one piece of hardware and allows system upgrades to occur on existing hardware with no downtime; costs associated with buying new hardware and downtime during upgrades are eliminated.<br />2.Flexibility and agility<br />Allows enterprises to be faster to deploy new services and flexible to accommodate changes in requirements, and by decoupling business processing from physical hardware, virtualization improves agility by enabling IT to respond to rapid changes in demand<br />3.Enhance your organization's data integrity<br />With Virtualization, data can be abstracted. This means important corporate data can be kept completely separate from end-user data; or even keep all of end-user data separate from one another.<br />4.Business Continuity & Disaster Recovery<br />Virtualization provides continued operation during maintenance periods, and rapid recovery in unplanned outages. So no more business downtime and loss of revenue.<br />RedHat modified 17<br />Cloud Computing - NYU POLY - Prof. Ravi Rajagopal - Copyright © 2010<br />virtualization – benefits<br />5. Green IT<br />The ability to run multiple operating systems and applications on fewer machines reduces the amount of hardware, thus reducing the amount of heat generated and energy used in the data center.<br />7. Elasticity<br />Virtualization stores resources in an aggregate pool and enables to pull them when and where needed as necessary.<br />8. Scalability<br />Virtualization allows re-use of existing hardware, and easily add-on new applications and hardware to current environment -- as and when, to grow.<br />9. Reduced Downtime<br />Virtual images are easier to restore after a failure – either an operational failure or a hardware failure. Portability of virtual images allows new and different hardware to be used for recovery quickly.<br />10. Reduced Admin Costs<br />Virtualization enables remote administration which by nature is cost effective<br />good virtualization management platform characteristics:<br />Agile Provisioning: Rapidly deploy virtual infrastructures & applications, or deploy private cloud systems, efficiently serving business needs in real-time<br />Ensure Compliance: Automate configuration auditing detects and tracks changes against a gold standard, meeting compliance goals.<br />Optimize Performance: Accurately detect, diagnose & remediate root-cause & performance issues, gaining visibility & control across heterogeneous virtual environments<br />Secure Access: Restrict privileged access and assure proper access audit and control to support dynamic virtual infrastructures<br />Enterprise Orchestration Orchestrate complex processes on multiple physical & virtual platforms, embedding knowledge, freeing up staff, and relieving skills pressure<br />Business Continuity & Compliance: Ensure data protection & automate recovery processing, for a highly available physical+ virtual infrastructure<br />Identity Management<br />Manage and govern identities and what they can access based on their role<br />Identity Management,Role Management,Compliance Management<br />BB-Access Management <br />Control access to systems & applications across physical, virtual & cloud environments. Access Management, Federation: Single Sign on, Services Security, Virtual  Access<br />Information management <br />Find, classify and control how information is used based on content and identity<br />Data loss Prevention, Data Policy Management<br />Privacy-Privacy and Security have distinct features<br />
Security is a requirement for privacy, and not vice versa<br />
Privacy is not a subset of Security<br />
Most often, privacy is confused for security to voice concerns with cloud computing<br />
“The rights and obligations of individuals and organizations with respect to the collection, use, retention, and disclosure of personal information” American Institute of CPAs<br />Def:
“personal data” is any information relating to an indentified or indefinable individual (Organization for Economic Cooperation and Development)<br />
Concept of privacy varies widely within and among countries, making it a challenge, especially for cloud<br />
<br />
<br />
<br />
Notes
Notes
Notes

Notes

  • 1.
    Origins from thetelecom network<br />Service perspective; network agnostic<br />Focus on inputs and outputs; internal interworking abstracted<br />Overall architecture and interfaces need to be well defined and unambiguous for the model to work<br />Telecom network evolved through a structured manner over the last hundred years<br />Cloud computing is in the process of being “assembled” over the last few years<br />Def:Abstraction of networks, platforms, servers, data, and applications Framework to develop and deliver cost and quality effective IT Services “Cloud computing is a model for enabling convenient<br /> on demand, network access to a shared pool of resources (e.g., networks, servers, storage, applications, services)<br /> that can be rapidly provisioned and released<br /> with minimal management effort or service provider interaction” — Cloud computing model is composed of Five essential characteristics-On-demand self service: (Provisioning on demand) Users can unilaterally provision computing capabilities with minimal human interaction<br />Broad network access: (Ubiquitous internet access) capabilities available over network can be accessed by standard client platforms, such as PCs, mobile phones, PDAs<br />Resource Pooling : (Virtualized resources, location independent) computing resources are pooled to serve multiple consumers using a multi tenant model<br />Rapid Elasticity: (scale capacity up and down) capabilities can be rapidly and automatically scaled up or down to meeting the demand<br />Metered Service: (Usage based billing) resources are transparent and can be monitored, controlled and reported<br />Four deployment models-Private cloud: infrastructure operated solely for an organization; may exist on and off premises<br />Public cloud: available to the public (individuals or enterprises), have mega scale infrastructures<br /> amazon, google, microsoft, IBM, CA/3Tera, vmware, salesforce.com, rackspace, etc..<br />Community cloud: shared infrastructure for specific purpose, mostly governments that share common concerns, e.g., security, policy,<br />Hybrid cloud: composition of two or more of private and/or public clouds bound together with standardized or proprietary technology<br />Three service architectures-Software as a Service SaaS: Consumer applicationsaccessible from various client devices with limited user specific configuration settings. No access or control of underlying cloud infrastructure<br />Platform as a Service PaaS: Platform consisting of programming languages and tools necessary to create, host and manage applications in the cloud. No access to network servers, operating systems and storage<br />Infrastructure as a Service IaaS: Fundamental computing resources including processing, storage, and select networking components needed to deploy and run arbitrary software for systems and applications<br />cloud computing reference model<br />Cloud reference model verticals: User, Vendor, and Provider — Cloud Vendor<br />Has local tax registration and offers services to Cloud User with guaranteed Quality of Experience (QoE) and Quality of Service (QoS) within the framework of an SLA<br />Brokerage and clearing house that has pre negotiated access to one or more XaaS vendors<br />Provides data security and regulatory compliance to the user —Similar to utility and telecom evolution: not only improves service<br />quality but creates new economic opportunities<br />Last mile services to the end user via wired or wireless<br />TargetedtowardSMEsandHomeOffices<br />SaaS: recall the “UC Berkeley” SaaS tradeoff charging model:<br />UserHourscloud.(revenue–Costcloud)≥UserHoursdatacenter .[revenue–(Costdatacenter/Utilization)]<br />IaaS: computing charged per processor hour, storage by GB/month, and transactions by numbers<br />PasS: charging units vary, such as (a) by longer time units, e.g a middleware platform by year, or (b) by number of users accessing the platform<br />Cloud vendors will manage cloud user’s QoS and SLA contracts, and have back-to-back agreement <br />Cloud vendors share revenue with partners and other providers who are part of the value-chain<br />Usage of resources will be measured, rated, and billed at the Point of Interconnection (PoI)<br />economic benefits of cloud adoption<br />Strategic flexibility — Cost reduction — Software availability — Scalability<br />Skills and Staffing — Energy efficiency — System redundancy and data backuplaws of cloudonomics<br />1.Utility services cost less even though they cost more although utilities cost more when they are used, they cost nothing when they are not<br />2.On-demand trumps forecasting forecasting is often wrong, so the ability to react instantaneously means higher<br />revenues, and lower costs<br />3.The peak of the sum is never greater than the sum of the peaks clouds can reallocate resources across many enterprises with different peak periods<br />4.Aggregate demand is smoother than individual aggregating demand from multiple customers tends to smooth out variation<br />5.Average unit costs are reduced by distributing fixed costs over more<br />units of output while large enterprises benefit from economies of scale, larger cloud service providers<br />can benefit from even greater economies of scale Joe Weinman, VP AT&T 2009<br />3<br />Cloud Computing - NYU POLY - Prof. Ravi Rajagopal - Copyright © 2010<br />laws of cloudonomics<br />6.Superiority in numbers is the most important factor in the result of a<br />combat (Clausewitz) In the cloud theater, battles are waged between botnets and DoS attacks. A botnet of<br />100,000 servers each with a Mbps of bandwidth can launch 100 Gbps of attack<br />7.Space-time is a continuum (Einstein/Minkowski) One server for 1000 hours versus 1000 servers for an hour)<br />8.Dispersion is the inverse square of latency Reduced latency — the delay between making a request and getting a response — is<br />increasingly essential to delivering a range of services; to cut latency in half requires not twice as many nodes, but four times<br />9.Don’t put all your eggs in one basket Reliability of a system with n redundant components each with reliability r is 1-(1-r)^n<br />10.An object at rest tends to stay at rest (Newton)<br />A data center is a very, very large object owned by large companies and will stay put Joe Weinman, VP AT&T 2009<br />Definitions — Demand D(t) a function of time in the interval 0 ≤ t ≤ T — A = Average Demand —P = Peak Demand*Note A ≤ P+ — C = Unit cost per unit time for Legacy (Fixed) Capacity — U = Utility premium, i.e., pay per use premium for Cloud<br />Total cost of Cloud = A.U.C.T (pay per use based on A) Total cost of Legacy = P.C.T (Infrastructure in place based on P) a simple analysis follows ..If C=$2 /core CPU With U=2, Cloud rate will be C.U=$4/core CPU<br />If U=1, Legacy and Cloud rates are equal If U<1, Cloud rate is less than Legacy rate<br />If U>1, Cloud rate is more than Legacy rate<br />J. Weinman, AT&T 5<br />economy of cloud – mathematical proof<br />Case 1: If U<1<br />Total cost of Cloud = A.U.C.T since A≤P, A.U.C.T ≤ P.U.C.T since U<1, A.U.C.T < P (1) C T therefore, A U C T < P C T Cost of Cloud < Cost of Legacy<br />Total cost of Cloud = A.U.C.T since A=P, A.U.C.T = P.U.C.T since U=1, A.U.C.T = P (1) C T therefore, A U C T = P C T Cost of Cloud = Cost of Legacy<br />Total cost of Cloud = A.U.C.T since A<P, A.U.C.T < P.U.C.T since U=1, A.U.C.T < P (1) C T therefore, A U C T < P C T Cost of Cloud < Cost of Legacy<br />Virtualizationhasrootsinpartitioningand segmentation<br />•Started with Intel 8086 CPU family of “instruction set architecture” where the 16 bit architecture was logically segmented into registers and memory<br />• Virtualizationfadedintheearly90s,butwas reborn in late 90s, with “vmware” and the introduction of “server virtualization” product<br />• 2000–2008:virtualizationtechnologyboom! •Evolved into a natural “characteristic” of Cloud<br />virtualization – definition<br />Cloud Computing - NYU POLY - Prof. Ravi Rajagopal - Copyright © 2010<br />Virtualization refers to technologies that provide a<br />layer of abstraction between hardware and<br />associated software  Ability to serve multiple users with multiple<br />requirements  Ability to dynamically assign different physical and<br />virtual resources to users on demand  Provides location independence  Can be applied to any infrastructure layer – server<br />(hardware), memory, networks, storage, software: operating systems & applications<br />virtualization – benefits<br />1.Server Consolidation<br />Virtualization consolidates multiple systems onto one piece of hardware and allows system upgrades to occur on existing hardware with no downtime; costs associated with buying new hardware and downtime during upgrades are eliminated.<br />2.Flexibility and agility<br />Allows enterprises to be faster to deploy new services and flexible to accommodate changes in requirements, and by decoupling business processing from physical hardware, virtualization improves agility by enabling IT to respond to rapid changes in demand<br />3.Enhance your organization's data integrity<br />With Virtualization, data can be abstracted. This means important corporate data can be kept completely separate from end-user data; or even keep all of end-user data separate from one another.<br />4.Business Continuity & Disaster Recovery<br />Virtualization provides continued operation during maintenance periods, and rapid recovery in unplanned outages. So no more business downtime and loss of revenue.<br />RedHat modified 17<br />Cloud Computing - NYU POLY - Prof. Ravi Rajagopal - Copyright © 2010<br />virtualization – benefits<br />5. Green IT<br />The ability to run multiple operating systems and applications on fewer machines reduces the amount of hardware, thus reducing the amount of heat generated and energy used in the data center.<br />7. Elasticity<br />Virtualization stores resources in an aggregate pool and enables to pull them when and where needed as necessary.<br />8. Scalability<br />Virtualization allows re-use of existing hardware, and easily add-on new applications and hardware to current environment -- as and when, to grow.<br />9. Reduced Downtime<br />Virtual images are easier to restore after a failure – either an operational failure or a hardware failure. Portability of virtual images allows new and different hardware to be used for recovery quickly.<br />10. Reduced Admin Costs<br />Virtualization enables remote administration which by nature is cost effective<br />good virtualization management platform characteristics:<br />Agile Provisioning: Rapidly deploy virtual infrastructures & applications, or deploy private cloud systems, efficiently serving business needs in real-time<br />Ensure Compliance: Automate configuration auditing detects and tracks changes against a gold standard, meeting compliance goals.<br />Optimize Performance: Accurately detect, diagnose & remediate root-cause & performance issues, gaining visibility & control across heterogeneous virtual environments<br />Secure Access: Restrict privileged access and assure proper access audit and control to support dynamic virtual infrastructures<br />Enterprise Orchestration Orchestrate complex processes on multiple physical & virtual platforms, embedding knowledge, freeing up staff, and relieving skills pressure<br />Business Continuity & Compliance: Ensure data protection & automate recovery processing, for a highly available physical+ virtual infrastructure<br />Identity Management<br />Manage and govern identities and what they can access based on their role<br />Identity Management,Role Management,Compliance Management<br />BB-Access Management <br />Control access to systems & applications across physical, virtual & cloud environments. Access Management, Federation: Single Sign on, Services Security, Virtual Access<br />Information management <br />Find, classify and control how information is used based on content and identity<br />Data loss Prevention, Data Policy Management<br />Privacy-Privacy and Security have distinct features<br /> Security is a requirement for privacy, and not vice versa<br /> Privacy is not a subset of Security<br /> Most often, privacy is confused for security to voice concerns with cloud computing<br /> “The rights and obligations of individuals and organizations with respect to the collection, use, retention, and disclosure of personal information” American Institute of CPAs<br />Def: “personal data” is any information relating to an indentified or indefinable individual (Organization for Economic Cooperation and Development)<br /> Concept of privacy varies widely within and among countries, making it a challenge, especially for cloud<br /> <br /> <br /> <br />