SlideShare a Scribd company logo
2: Cloud Computing Paradigms

                              Zubair Nabi

                    zubair.nabi@itu.edu.pk


                            April 17, 2013




Zubair Nabi        2: Cloud Computing Paradigms   April 17, 2013   1 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   2 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   3 / 22
Cloud computing



      A realization of utility computing in which computation, storage, and
      services are offered as a metered service




  Zubair Nabi              2: Cloud Computing Paradigms             April 17, 2013   4 / 22
Cloud computing



      A realization of utility computing in which computation, storage, and
      services are offered as a metered service
      Encompasses applications delivered as services over the Internet and
      hardware and software in the datacenters that enable those services




  Zubair Nabi              2: Cloud Computing Paradigms             April 17, 2013   4 / 22
Cloud computing



      A realization of utility computing in which computation, storage, and
      services are offered as a metered service
      Encompasses applications delivered as services over the Internet and
      hardware and software in the datacenters that enable those services
                Software as a Service (SaaS)




  Zubair Nabi                   2: Cloud Computing Paradigms        April 17, 2013   4 / 22
Cloud computing



      A realization of utility computing in which computation, storage, and
      services are offered as a metered service
      Encompasses applications delivered as services over the Internet and
      hardware and software in the datacenters that enable those services
                Software as a Service (SaaS)
      Public Cloud: If available to the public as a pay-as-you-go model, e.g.
      Amazon Web Services, Google AppEngine, and Microsoft Azure




  Zubair Nabi                   2: Cloud Computing Paradigms        April 17, 2013   4 / 22
Cloud computing



      A realization of utility computing in which computation, storage, and
      services are offered as a metered service
      Encompasses applications delivered as services over the Internet and
      hardware and software in the datacenters that enable those services
                Software as a Service (SaaS)
      Public Cloud: If available to the public as a pay-as-you-go model, e.g.
      Amazon Web Services, Google AppEngine, and Microsoft Azure
      Private Cloud: Internal datacenters of an organization that are not
      publicly accessible




  Zubair Nabi                   2: Cloud Computing Paradigms        April 17, 2013   4 / 22
Advantages



Advantages to both service providers and end users




  Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance




  Zubair Nabi                    2: Cloud Computing Paradigms     April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning




  Zubair Nabi                    2: Cloud Computing Paradigms     April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning
                No need to build, provision, and maintain a datacenter




  Zubair Nabi                    2: Cloud Computing Paradigms            April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning
                No need to build, provision, and maintain a datacenter
                On the fly scaling




  Zubair Nabi                    2: Cloud Computing Paradigms            April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning
                No need to build, provision, and maintain a datacenter
                On the fly scaling
  2   End users:
                “Anytime, anywhere” access




  Zubair Nabi                    2: Cloud Computing Paradigms            April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning
                No need to build, provision, and maintain a datacenter
                On the fly scaling
  2   End users:
                “Anytime, anywhere” access
                Share data and collaborate easily




  Zubair Nabi                    2: Cloud Computing Paradigms            April 17, 2013   5 / 22
Advantages



Advantages to both service providers and end users
  1   Service providers:
                Simplified software installation and maintenance
                Centralized control over versioning
                No need to build, provision, and maintain a datacenter
                On the fly scaling
  2   End users:
                “Anytime, anywhere” access
                Share data and collaborate easily
                Safeguard data stored in the infrastructure (debatable)




  Zubair Nabi                     2: Cloud Computing Paradigms            April 17, 2013   5 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   6 / 22
History



      Phenomenal growth of Web services in late 90s and early 2000s




  Zubair Nabi             2: Cloud Computing Paradigms         April 17, 2013   7 / 22
History



      Phenomenal growth of Web services in late 90s and early 2000s
      Large Internet companies, including Amazon, eBay, Google, Microsoft,
      Yahoo, etc., already had massive infrastructure




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   7 / 22
History



      Phenomenal growth of Web services in late 90s and early 2000s
      Large Internet companies, including Amazon, eBay, Google, Microsoft,
      Yahoo, etc., already had massive infrastructure
      To keep up with demand, these companies also developed scalable
      software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.)




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   7 / 22
History



      Phenomenal growth of Web services in late 90s and early 2000s
      Large Internet companies, including Amazon, eBay, Google, Microsoft,
      Yahoo, etc., already had massive infrastructure
      To keep up with demand, these companies also developed scalable
      software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.)
      They also acquired the operational expertise to deter potential physical
      and electronic attacks




  Zubair Nabi              2: Cloud Computing Paradigms             April 17, 2013   7 / 22
History



      Phenomenal growth of Web services in late 90s and early 2000s
      Large Internet companies, including Amazon, eBay, Google, Microsoft,
      Yahoo, etc., already had massive infrastructure
      To keep up with demand, these companies also developed scalable
      software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.)
      They also acquired the operational expertise to deter potential physical
      and electronic attacks
      Therefore, they had already created extremely large datacenters to
      leverage statistical multiplexing and bulk purchasing of infrastructure




  Zubair Nabi               2: Cloud Computing Paradigms             April 17, 2013   7 / 22
Incentive for providers



      Incentives include revenue, leveraging existing investment, defending a
      franchise, attacking an incumbent, leveraging customer relationships, and
      becoming a platform




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   8 / 22
Incentive for providers



      Incentives include revenue, leveraging existing investment, defending a
      franchise, attacking an incumbent, leveraging customer relationships, and
      becoming a platform
      Data centers are being established in seemingly arbitrary locations




  Zubair Nabi              2: Cloud Computing Paradigms            April 17, 2013   8 / 22
Incentive for providers



      Incentives include revenue, leveraging existing investment, defending a
      franchise, attacking an incumbent, leveraging customer relationships, and
      becoming a platform
      Data centers are being established in seemingly arbitrary locations
      Reasons for choosing a location include costs of electricity, cooling,
      labour, property, and taxes




  Zubair Nabi               2: Cloud Computing Paradigms             April 17, 2013   8 / 22
Incentive for providers



      Incentives include revenue, leveraging existing investment, defending a
      franchise, attacking an incumbent, leveraging customer relationships, and
      becoming a platform
      Data centers are being established in seemingly arbitrary locations
      Reasons for choosing a location include costs of electricity, cooling,
      labour, property, and taxes
      Cooling and electricity account for 1/3rd of all costs!




  Zubair Nabi               2: Cloud Computing Paradigms             April 17, 2013   8 / 22
Incentive for providers



      Incentives include revenue, leveraging existing investment, defending a
      franchise, attacking an incumbent, leveraging customer relationships, and
      becoming a platform
      Data centers are being established in seemingly arbitrary locations
      Reasons for choosing a location include costs of electricity, cooling,
      labour, property, and taxes
      Cooling and electricity account for 1/3rd of all costs!
      Cheaper to ship data over fiber optic cables than to ship electricity over
      high-voltage transmission lines




  Zubair Nabi               2: Cloud Computing Paradigms             April 17, 2013   8 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   9 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”
      For instance:
                Payment model in Web 1.0: Contractual arrangement with a payment
                processing service such as VeriSign or Authorize.net; making it hard for
                small businesses to accept credit card payment online




  Zubair Nabi                     2: Cloud Computing Paradigms               April 17, 2013   9 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”
      For instance:
                Payment model in Web 1.0: Contractual arrangement with a payment
                processing service such as VeriSign or Authorize.net; making it hard for
                small businesses to accept credit card payment online
                Web 2.0: With PayPal-like services anyone can sign up and accept credit
                payments without a contract and a long-term commitment




  Zubair Nabi                    2: Cloud Computing Paradigms               April 17, 2013   9 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”
      For instance:
                Payment model in Web 1.0: Contractual arrangement with a payment
                processing service such as VeriSign or Authorize.net; making it hard for
                small businesses to accept credit card payment online
                Web 2.0: With PayPal-like services anyone can sign up and accept credit
                payments without a contract and a long-term commitment
      Another example:
                Ad revenue model in Web 1.0: Set up a relationship with an ad placement
                company, such as DoubleClick




  Zubair Nabi                    2: Cloud Computing Paradigms               April 17, 2013   9 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”
      For instance:
                Payment model in Web 1.0: Contractual arrangement with a payment
                processing service such as VeriSign or Authorize.net; making it hard for
                small businesses to accept credit card payment online
                Web 2.0: With PayPal-like services anyone can sign up and accept credit
                payments without a contract and a long-term commitment
      Another example:
                Ad revenue model in Web 1.0: Set up a relationship with an ad placement
                company, such as DoubleClick
                Web 2.0: Use Google AdSense




  Zubair Nabi                    2: Cloud Computing Paradigms               April 17, 2013   9 / 22
New technology trends and business models

      “High-touch, high-margin, high-commitment” provisioning of service to
      “low-touch, low-margin, low-commitment”
      For instance:
                Payment model in Web 1.0: Contractual arrangement with a payment
                processing service such as VeriSign or Authorize.net; making it hard for
                small businesses to accept credit card payment online
                Web 2.0: With PayPal-like services anyone can sign up and accept credit
                payments without a contract and a long-term commitment
      Another example:
                Ad revenue model in Web 1.0: Set up a relationship with an ad placement
                company, such as DoubleClick
                Web 2.0: Use Google AdSense
      This same model was used by Amazon Web Services in 2006:
      pay-as-you-go computing with no contract, with the only requirement
      being a credit card


  Zubair Nabi                    2: Cloud Computing Paradigms               April 17, 2013   9 / 22
New applications



      Mobile applications: Require high availability and rely on large data sets
      that are most conveniently hosted in large datacenters




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   10 / 22
New applications



      Mobile applications: Require high availability and rely on large data sets
      that are most conveniently hosted in large datacenters
      Parallel batch processing: Analytics jobs that analyze terabytes of data
      and can take hours to finish can leverage the “cost associativity” of the
      cloud




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   10 / 22
New applications



      Mobile applications: Require high availability and rely on large data sets
      that are most conveniently hosted in large datacenters
      Parallel batch processing: Analytics jobs that analyze terabytes of data
      and can take hours to finish can leverage the “cost associativity” of the
      cloud
      Business analytics: Understanding customers, supply chains, buying
      habits, ranking, and so on




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   10 / 22
New applications



      Mobile applications: Require high availability and rely on large data sets
      that are most conveniently hosted in large datacenters
      Parallel batch processing: Analytics jobs that analyze terabytes of data
      and can take hours to finish can leverage the “cost associativity” of the
      cloud
      Business analytics: Understanding customers, supply chains, buying
      habits, ranking, and so on
      Computation offloading: Compute-intensive tasks are offloaded to the
      cloud. For instance, Matlab, Mathematica, image rendering, 3D
      animations, etc.




  Zubair Nabi              2: Cloud Computing Paradigms           April 17, 2013   10 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   11 / 22
Classes of utility computing



      Every application needs computation, storage, and quite possibly
      communication




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   12 / 22
Classes of utility computing



      Every application needs computation, storage, and quite possibly
      communication
      These resources need to be virtualized to achieve elasticity and the
      illusion of infinite capacity




  Zubair Nabi              2: Cloud Computing Paradigms            April 17, 2013   12 / 22
Classes of utility computing



      Every application needs computation, storage, and quite possibly
      communication
      These resources need to be virtualized to achieve elasticity and the
      illusion of infinite capacity
      The details of statistical multiplexing and sharing is abstracted away from
      the programmer




  Zubair Nabi               2: Cloud Computing Paradigms            April 17, 2013   12 / 22
Classes of utility computing



      Every application needs computation, storage, and quite possibly
      communication
      These resources need to be virtualized to achieve elasticity and the
      illusion of infinite capacity
      The details of statistical multiplexing and sharing is abstracted away from
      the programmer
      Different utility computing offerings can be distinguished on the basis of
      the abstraction presented to the programmer




  Zubair Nabi               2: Cloud Computing Paradigms            April 17, 2013   12 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware




  Zubair Nabi              2: Cloud Computing Paradigms   April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards




  Zubair Nabi              2: Cloud Computing Paradigms         April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards
      Employed by Amazon EC2




  Zubair Nabi              2: Cloud Computing Paradigms         April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards
      Employed by Amazon EC2
      A very thin API is exposed to request and configure virtualized hardware




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards
      Employed by Amazon EC2
      A very thin API is exposed to request and configure virtualized hardware
      No bar on the kinds of applications that can be hosted




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards
      Employed by Amazon EC2
      A very thin API is exposed to request and configure virtualized hardware
      No bar on the kinds of applications that can be hosted
                Low level virtualization, block-device storage, and IP-level connectivity
                allow developers to design any application




  Zubair Nabi                     2: Cloud Computing Paradigms                 April 17, 2013   13 / 22
Bare metal hardware abstraction



      An instance looks like physical hardware
      Programmers control the entire software stack from the kernel upwards
      Employed by Amazon EC2
      A very thin API is exposed to request and configure virtualized hardware
      No bar on the kinds of applications that can be hosted
                Low level virtualization, block-device storage, and IP-level connectivity
                allow developers to design any application
      On the downside, scalability and failover are application-dependent




  Zubair Nabi                     2: Cloud Computing Paradigms                 April 17, 2013   13 / 22
Domain-specific platform



      Target traditional web applications




  Zubair Nabi               2: Cloud Computing Paradigms   April 17, 2013   14 / 22
Domain-specific platform



      Target traditional web applications
      Enforce an application structure of clean separation between a stateless
      computation tier and a stateful storage tier




  Zubair Nabi               2: Cloud Computing Paradigms          April 17, 2013   14 / 22
Domain-specific platform



      Target traditional web applications
      Enforce an application structure of clean separation between a stateless
      computation tier and a stateful storage tier
      Employed by Google AppEngine




  Zubair Nabi               2: Cloud Computing Paradigms          April 17, 2013   14 / 22
Domain-specific platform



      Target traditional web applications
      Enforce an application structure of clean separation between a stateless
      computation tier and a stateful storage tier
      Employed by Google AppEngine
      Applications are expected to be request-reply based




  Zubair Nabi               2: Cloud Computing Paradigms          April 17, 2013   14 / 22
Domain-specific platform



      Target traditional web applications
      Enforce an application structure of clean separation between a stateless
      computation tier and a stateful storage tier
      Employed by Google AppEngine
      Applications are expected to be request-reply based
      In contrast to the bare metal hardware abstraction, enable automatic
      scaling and high-availability mechanisms




  Zubair Nabi               2: Cloud Computing Paradigms          April 17, 2013   14 / 22
Domain-specific platform



      Target traditional web applications
      Enforce an application structure of clean separation between a stateless
      computation tier and a stateful storage tier
      Employed by Google AppEngine
      Applications are expected to be request-reply based
      In contrast to the bare metal hardware abstraction, enable automatic
      scaling and high-availability mechanisms
      Not suitable for general-purpose computing




  Zubair Nabi               2: Cloud Computing Paradigms          April 17, 2013   14 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience




  Zubair Nabi             2: Cloud Computing Paradigms         April 17, 2013   15 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience
      Offered by Microsoft’s Azure




  Zubair Nabi              2: Cloud Computing Paradigms        April 17, 2013   15 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience
      Offered by Microsoft’s Azure
      Applications are written using .NET libraries and compiled to the Common
      Language Runtime (A language-independent management environment)




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   15 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience
      Offered by Microsoft’s Azure
      Applications are written using .NET libraries and compiled to the Common
      Language Runtime (A language-independent management environment)
      Supports general purpose computing




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   15 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience
      Offered by Microsoft’s Azure
      Applications are written using .NET libraries and compiled to the Common
      Language Runtime (A language-independent management environment)
      Supports general purpose computing
      Users have control over the choice of language but not the underlying OS
      or runtime




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   15 / 22
Hybrid


      Offer a sweet spot between flexibility and programmer convenience
      Offered by Microsoft’s Azure
      Applications are written using .NET libraries and compiled to the Common
      Language Runtime (A language-independent management environment)
      Supports general purpose computing
      Users have control over the choice of language but not the underlying OS
      or runtime
      Provide some degree of automatic failover and scalability but require
      some help from the developer in the form of declaration of some
      application properties




  Zubair Nabi              2: Cloud Computing Paradigms            April 17, 2013   15 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   16 / 22
Elasticity




      Pay-as-you-go model: Only pay for what you use




  Zubair Nabi             2: Cloud Computing Paradigms   April 17, 2013   17 / 22
Elasticity




      Pay-as-you-go model: Only pay for what you use
      Add or remove resources at a fine grain (such as one server at a time)
      with minimal lead time




  Zubair Nabi              2: Cloud Computing Paradigms          April 17, 2013   17 / 22
Elasticity




      Pay-as-you-go model: Only pay for what you use
      Add or remove resources at a fine grain (such as one server at a time)
      with minimal lead time
      Useful for traffic spikes such as “Black Friday”




  Zubair Nabi               2: Cloud Computing Paradigms         April 17, 2013   17 / 22
Elasticity




      Pay-as-you-go model: Only pay for what you use
      Add or remove resources at a fine grain (such as one server at a time)
      with minimal lead time
      Useful for traffic spikes such as “Black Friday”
      Over time, hardware costs come down and vendors acquire updated
      hardware. Thus, benefiting the tenant




  Zubair Nabi               2: Cloud Computing Paradigms         April 17, 2013   17 / 22
Reasons for companies to migrate to the cloud




      Pay separately per resource: Pay proportional to resource requirements




  Zubair Nabi             2: Cloud Computing Paradigms         April 17, 2013   18 / 22
Reasons for companies to migrate to the cloud




      Pay separately per resource: Pay proportional to resource requirements
      Power, cooling, and physical plant costs: Cost of electricity and
      cooling already factored in




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   18 / 22
Reasons for companies to migrate to the cloud




      Pay separately per resource: Pay proportional to resource requirements
      Power, cooling, and physical plant costs: Cost of electricity and
      cooling already factored in
      Man-power costs: No need to employ sysadmins




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   18 / 22
Reasons for companies to migrate to the cloud




      Pay separately per resource: Pay proportional to resource requirements
      Power, cooling, and physical plant costs: Cost of electricity and
      cooling already factored in
      Man-power costs: No need to employ sysadmins
      Operational costs: Low-level upgrades and software patches
      responsibility of the provider




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   18 / 22
Outline


1    Introduction


2    Cloud service providers


3    Utility Computing


4    Economics


5    Challenges




    Zubair Nabi            2: Cloud Computing Paradigms   April 17, 2013   19 / 22
Obstacles




 1    Service availability: Possibility of cloud outage




  Zubair Nabi               2: Cloud Computing Paradigms   April 17, 2013   20 / 22
Obstacles




 1    Service availability: Possibility of cloud outage
 2    Data lock-in: Reliance on cloud specific APIs




  Zubair Nabi               2: Cloud Computing Paradigms   April 17, 2013   20 / 22
Obstacles




 1    Service availability: Possibility of cloud outage
 2    Data lock-in: Reliance on cloud specific APIs
 3    Security: Requires strong encrypted storage, VLANs, and network
      middleboxes (firewalls, etc.)




  Zubair Nabi               2: Cloud Computing Paradigms      April 17, 2013   20 / 22
Obstacles




 1    Service availability: Possibility of cloud outage
 2    Data lock-in: Reliance on cloud specific APIs
 3    Security: Requires strong encrypted storage, VLANs, and network
      middleboxes (firewalls, etc.)
 4    Data transfer bottlenecks: Moving large amounts of data in and out is
      expensive




  Zubair Nabi               2: Cloud Computing Paradigms        April 17, 2013   20 / 22
Obstacles




 1    Service availability: Possibility of cloud outage
 2    Data lock-in: Reliance on cloud specific APIs
 3    Security: Requires strong encrypted storage, VLANs, and network
      middleboxes (firewalls, etc.)
 4    Data transfer bottlenecks: Moving large amounts of data in and out is
      expensive
 5    Performance unpredictability: Resource sharing between applications




  Zubair Nabi               2: Cloud Computing Paradigms        April 17, 2013   20 / 22
Obstacles (2)


  6   Scalable storage: No standard model to arbitrarily scale storage up and
      down on-demand while ensuring data durability and high availability




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   21 / 22
Obstacles (2)


  6   Scalable storage: No standard model to arbitrarily scale storage up and
      down on-demand while ensuring data durability and high availability
  7   Bugs in large-scale distributed systems: Hard to debug large-scale
      applications in full deployment




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   21 / 22
Obstacles (2)


  6   Scalable storage: No standard model to arbitrarily scale storage up and
      down on-demand while ensuring data durability and high availability
  7   Bugs in large-scale distributed systems: Hard to debug large-scale
      applications in full deployment
  8   Scaling quickly: Automatically scaling while conserving resources and
      money is an open ended problem




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   21 / 22
Obstacles (2)


  6   Scalable storage: No standard model to arbitrarily scale storage up and
      down on-demand while ensuring data durability and high availability
  7   Bugs in large-scale distributed systems: Hard to debug large-scale
      applications in full deployment
  8   Scaling quickly: Automatically scaling while conserving resources and
      money is an open ended problem
  9   Reputation fate sharing: Bad behaviour by one tenant can reflect badly
      on the rest




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   21 / 22
Obstacles (2)


  6   Scalable storage: No standard model to arbitrarily scale storage up and
      down on-demand while ensuring data durability and high availability
  7   Bugs in large-scale distributed systems: Hard to debug large-scale
      applications in full deployment
  8   Scaling quickly: Automatically scaling while conserving resources and
      money is an open ended problem
  9   Reputation fate sharing: Bad behaviour by one tenant can reflect badly
      on the rest
 10   Software licensing: Gap between pay-as-you-go model and software
      licensing




  Zubair Nabi             2: Cloud Computing Paradigms           April 17, 2013   21 / 22
References




 1    Above the Clouds: A Berkeley View of Cloud Computing" by Michael
      Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz,
      Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica,
      and Matei Zaharia. Technical Report EECS-2009-28, EECS Department,
      University of California, Berkeley.




  Zubair Nabi             2: Cloud Computing Paradigms         April 17, 2013   22 / 22

More Related Content

What's hot

Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Rana assad ali
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
Pradeep Kumar TS
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
RituparnaNag
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationAyaz Shahid
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
Raja Waseem Akhtar
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
Rishikese MR
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
Devang Badrakiya
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
Saisharan Amaravadhi
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
Vasuki Ramasamy
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
kanaka vardhini
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
Pooja Sharma
 

What's hot (20)

Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Web Security
Web SecurityWeb Security
Web Security
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 

Viewers also liked

AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!Zubair Nabi
 
Topic 3: Large-scale Distributed Systems
Topic 3: Large-scale Distributed SystemsTopic 3: Large-scale Distributed Systems
Topic 3: Large-scale Distributed Systems
Zubair Nabi
 
Lab 4: Interfacing with Cassandra
Lab 4: Interfacing with CassandraLab 4: Interfacing with Cassandra
Lab 4: Interfacing with Cassandra
Zubair Nabi
 
Topic 11: Google Filesystem
Topic 11: Google FilesystemTopic 11: Google Filesystem
Topic 11: Google Filesystem
Zubair Nabi
 
Topic 4: Concurrency
Topic 4: ConcurrencyTopic 4: Concurrency
Topic 4: Concurrency
Zubair Nabi
 
AOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksAOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksZubair Nabi
 
MapReduce and DBMS Hybrids
MapReduce and DBMS HybridsMapReduce and DBMS Hybrids
MapReduce and DBMS Hybrids
Zubair Nabi
 
AOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device DriversAOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device DriversZubair Nabi
 
Topic 5: MapReduce Theory and Implementation
Topic 5: MapReduce Theory and ImplementationTopic 5: MapReduce Theory and Implementation
Topic 5: MapReduce Theory and Implementation
Zubair Nabi
 
AOS Lab 5: System calls
AOS Lab 5: System callsAOS Lab 5: System calls
AOS Lab 5: System callsZubair Nabi
 
Lab 3: Writing a Naiad Application
Lab 3: Writing a Naiad ApplicationLab 3: Writing a Naiad Application
Lab 3: Writing a Naiad Application
Zubair Nabi
 
AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!Zubair Nabi
 
The Anatomy of Web Censorship in Pakistan
The Anatomy of Web Censorship in PakistanThe Anatomy of Web Censorship in Pakistan
The Anatomy of Web Censorship in PakistanZubair Nabi
 
Topic 7: Shortcomings in the MapReduce Paradigm
Topic 7: Shortcomings in the MapReduce ParadigmTopic 7: Shortcomings in the MapReduce Paradigm
Topic 7: Shortcomings in the MapReduce Paradigm
Zubair Nabi
 
MapReduce Application Scripting
MapReduce Application ScriptingMapReduce Application Scripting
MapReduce Application Scripting
Zubair Nabi
 
Topic 13: Cloud Stacks
Topic 13: Cloud StacksTopic 13: Cloud Stacks
Topic 13: Cloud Stacks
Zubair Nabi
 
Topic 8: Enhancements and Alternative Architectures
Topic 8: Enhancements and Alternative ArchitecturesTopic 8: Enhancements and Alternative Architectures
Topic 8: Enhancements and Alternative Architectures
Zubair Nabi
 
AOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on itAOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on itZubair Nabi
 
Lab 1: Introduction to Amazon EC2 and MPI
Lab 1: Introduction to Amazon EC2 and MPILab 1: Introduction to Amazon EC2 and MPI
Lab 1: Introduction to Amazon EC2 and MPI
Zubair Nabi
 
AOS Lab 6: Scheduling
AOS Lab 6: SchedulingAOS Lab 6: Scheduling
AOS Lab 6: SchedulingZubair Nabi
 

Viewers also liked (20)

AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!
 
Topic 3: Large-scale Distributed Systems
Topic 3: Large-scale Distributed SystemsTopic 3: Large-scale Distributed Systems
Topic 3: Large-scale Distributed Systems
 
Lab 4: Interfacing with Cassandra
Lab 4: Interfacing with CassandraLab 4: Interfacing with Cassandra
Lab 4: Interfacing with Cassandra
 
Topic 11: Google Filesystem
Topic 11: Google FilesystemTopic 11: Google Filesystem
Topic 11: Google Filesystem
 
Topic 4: Concurrency
Topic 4: ConcurrencyTopic 4: Concurrency
Topic 4: Concurrency
 
AOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksAOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocks
 
MapReduce and DBMS Hybrids
MapReduce and DBMS HybridsMapReduce and DBMS Hybrids
MapReduce and DBMS Hybrids
 
AOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device DriversAOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device Drivers
 
Topic 5: MapReduce Theory and Implementation
Topic 5: MapReduce Theory and ImplementationTopic 5: MapReduce Theory and Implementation
Topic 5: MapReduce Theory and Implementation
 
AOS Lab 5: System calls
AOS Lab 5: System callsAOS Lab 5: System calls
AOS Lab 5: System calls
 
Lab 3: Writing a Naiad Application
Lab 3: Writing a Naiad ApplicationLab 3: Writing a Naiad Application
Lab 3: Writing a Naiad Application
 
AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!AOS Lab 1: Hello, Linux!
AOS Lab 1: Hello, Linux!
 
The Anatomy of Web Censorship in Pakistan
The Anatomy of Web Censorship in PakistanThe Anatomy of Web Censorship in Pakistan
The Anatomy of Web Censorship in Pakistan
 
Topic 7: Shortcomings in the MapReduce Paradigm
Topic 7: Shortcomings in the MapReduce ParadigmTopic 7: Shortcomings in the MapReduce Paradigm
Topic 7: Shortcomings in the MapReduce Paradigm
 
MapReduce Application Scripting
MapReduce Application ScriptingMapReduce Application Scripting
MapReduce Application Scripting
 
Topic 13: Cloud Stacks
Topic 13: Cloud StacksTopic 13: Cloud Stacks
Topic 13: Cloud Stacks
 
Topic 8: Enhancements and Alternative Architectures
Topic 8: Enhancements and Alternative ArchitecturesTopic 8: Enhancements and Alternative Architectures
Topic 8: Enhancements and Alternative Architectures
 
AOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on itAOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on it
 
Lab 1: Introduction to Amazon EC2 and MPI
Lab 1: Introduction to Amazon EC2 and MPILab 1: Introduction to Amazon EC2 and MPI
Lab 1: Introduction to Amazon EC2 and MPI
 
AOS Lab 6: Scheduling
AOS Lab 6: SchedulingAOS Lab 6: Scheduling
AOS Lab 6: Scheduling
 

Similar to Topic 2: Cloud Computing Paradigms

IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing Application
IRJET Journal
 
A view of Cloud Computing
A view of Cloud ComputingA view of Cloud Computing
A view of Cloud Computing
Asli Yazagan
 
Various Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingVarious Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud Computing
INFOGAIN PUBLICATION
 
CLOUD COMPUTING ppt
CLOUD COMPUTING pptCLOUD COMPUTING ppt
CLOUD COMPUTING ppt
kalyani reddy
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
Divyesh Shah
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
IRJET Journal
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
ijceronline
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
Lakshika Rasanjali
 
Find out what's new in SaaS application architecture design (1).pdf
Find out what's new in SaaS application architecture design (1).pdfFind out what's new in SaaS application architecture design (1).pdf
Find out what's new in SaaS application architecture design (1).pdf
Praveen Rastogi
 
Find out what's new in SaaS application architecture design.pdf
Find out what's new in SaaS application architecture design.pdfFind out what's new in SaaS application architecture design.pdf
Find out what's new in SaaS application architecture design.pdf
Praveen Rastogi
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
dailytimeupdate.com
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology Trends
SynergisIT
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
eSAT Publishing House
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
ijccsa
 
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
Denny Muktar
 
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
Eswar Publications
 

Similar to Topic 2: Cloud Computing Paradigms (20)

IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing Application
 
A view of Cloud Computing
A view of Cloud ComputingA view of Cloud Computing
A view of Cloud Computing
 
Various Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingVarious Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud Computing
 
CLOUD COMPUTING ppt
CLOUD COMPUTING pptCLOUD COMPUTING ppt
CLOUD COMPUTING ppt
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Find out what's new in SaaS application architecture design (1).pdf
Find out what's new in SaaS application architecture design (1).pdfFind out what's new in SaaS application architecture design (1).pdf
Find out what's new in SaaS application architecture design (1).pdf
 
Find out what's new in SaaS application architecture design.pdf
Find out what's new in SaaS application architecture design.pdfFind out what's new in SaaS application architecture design.pdf
Find out what's new in SaaS application architecture design.pdf
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
2013 Technology Trends
2013 Technology Trends2013 Technology Trends
2013 Technology Trends
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
 
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
 

More from Zubair Nabi

AOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationAOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationZubair Nabi
 
AOS Lab 11: Virtualization
AOS Lab 11: VirtualizationAOS Lab 11: Virtualization
AOS Lab 11: VirtualizationZubair Nabi
 
AOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondAOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondZubair Nabi
 
AOS Lab 7: Page tables
AOS Lab 7: Page tablesAOS Lab 7: Page tables
AOS Lab 7: Page tablesZubair Nabi
 
AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!Zubair Nabi
 
The Big Data Stack
The Big Data StackThe Big Data Stack
The Big Data StackZubair Nabi
 
Raabta: Low-cost Video Conferencing for the Developing World
Raabta: Low-cost Video Conferencing for the Developing WorldRaabta: Low-cost Video Conferencing for the Developing World
Raabta: Low-cost Video Conferencing for the Developing WorldZubair Nabi
 
Topic 15: Datacenter Design and Networking
Topic 15: Datacenter Design and NetworkingTopic 15: Datacenter Design and Networking
Topic 15: Datacenter Design and Networking
Zubair Nabi
 
Topic 14: Operating Systems and Virtualization
Topic 14: Operating Systems and VirtualizationTopic 14: Operating Systems and Virtualization
Topic 14: Operating Systems and Virtualization
Zubair Nabi
 
Lab 5: Interconnecting a Datacenter using Mininet
Lab 5: Interconnecting a Datacenter using MininetLab 5: Interconnecting a Datacenter using Mininet
Lab 5: Interconnecting a Datacenter using Mininet
Zubair Nabi
 
Topic 12: NoSQL in Action
Topic 12: NoSQL in ActionTopic 12: NoSQL in Action
Topic 12: NoSQL in Action
Zubair Nabi
 
Topic 10: Taxonomy of Data and Storage
Topic 10: Taxonomy of Data and StorageTopic 10: Taxonomy of Data and Storage
Topic 10: Taxonomy of Data and Storage
Zubair Nabi
 
Topic 9: MR+
Topic 9: MR+Topic 9: MR+
Topic 9: MR+
Zubair Nabi
 

More from Zubair Nabi (13)

AOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationAOS Lab 12: Network Communication
AOS Lab 12: Network Communication
 
AOS Lab 11: Virtualization
AOS Lab 11: VirtualizationAOS Lab 11: Virtualization
AOS Lab 11: Virtualization
 
AOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondAOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyond
 
AOS Lab 7: Page tables
AOS Lab 7: Page tablesAOS Lab 7: Page tables
AOS Lab 7: Page tables
 
AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!
 
The Big Data Stack
The Big Data StackThe Big Data Stack
The Big Data Stack
 
Raabta: Low-cost Video Conferencing for the Developing World
Raabta: Low-cost Video Conferencing for the Developing WorldRaabta: Low-cost Video Conferencing for the Developing World
Raabta: Low-cost Video Conferencing for the Developing World
 
Topic 15: Datacenter Design and Networking
Topic 15: Datacenter Design and NetworkingTopic 15: Datacenter Design and Networking
Topic 15: Datacenter Design and Networking
 
Topic 14: Operating Systems and Virtualization
Topic 14: Operating Systems and VirtualizationTopic 14: Operating Systems and Virtualization
Topic 14: Operating Systems and Virtualization
 
Lab 5: Interconnecting a Datacenter using Mininet
Lab 5: Interconnecting a Datacenter using MininetLab 5: Interconnecting a Datacenter using Mininet
Lab 5: Interconnecting a Datacenter using Mininet
 
Topic 12: NoSQL in Action
Topic 12: NoSQL in ActionTopic 12: NoSQL in Action
Topic 12: NoSQL in Action
 
Topic 10: Taxonomy of Data and Storage
Topic 10: Taxonomy of Data and StorageTopic 10: Taxonomy of Data and Storage
Topic 10: Taxonomy of Data and Storage
 
Topic 9: MR+
Topic 9: MR+Topic 9: MR+
Topic 9: MR+
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Topic 2: Cloud Computing Paradigms

  • 1. 2: Cloud Computing Paradigms Zubair Nabi zubair.nabi@itu.edu.pk April 17, 2013 Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 1 / 22
  • 2. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 2 / 22
  • 3. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 3 / 22
  • 4. Cloud computing A realization of utility computing in which computation, storage, and services are offered as a metered service Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
  • 5. Cloud computing A realization of utility computing in which computation, storage, and services are offered as a metered service Encompasses applications delivered as services over the Internet and hardware and software in the datacenters that enable those services Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
  • 6. Cloud computing A realization of utility computing in which computation, storage, and services are offered as a metered service Encompasses applications delivered as services over the Internet and hardware and software in the datacenters that enable those services Software as a Service (SaaS) Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
  • 7. Cloud computing A realization of utility computing in which computation, storage, and services are offered as a metered service Encompasses applications delivered as services over the Internet and hardware and software in the datacenters that enable those services Software as a Service (SaaS) Public Cloud: If available to the public as a pay-as-you-go model, e.g. Amazon Web Services, Google AppEngine, and Microsoft Azure Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
  • 8. Cloud computing A realization of utility computing in which computation, storage, and services are offered as a metered service Encompasses applications delivered as services over the Internet and hardware and software in the datacenters that enable those services Software as a Service (SaaS) Public Cloud: If available to the public as a pay-as-you-go model, e.g. Amazon Web Services, Google AppEngine, and Microsoft Azure Private Cloud: Internal datacenters of an organization that are not publicly accessible Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 4 / 22
  • 9. Advantages Advantages to both service providers and end users Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 10. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 11. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 12. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning No need to build, provision, and maintain a datacenter Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 13. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning No need to build, provision, and maintain a datacenter On the fly scaling Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 14. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning No need to build, provision, and maintain a datacenter On the fly scaling 2 End users: “Anytime, anywhere” access Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 15. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning No need to build, provision, and maintain a datacenter On the fly scaling 2 End users: “Anytime, anywhere” access Share data and collaborate easily Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 16. Advantages Advantages to both service providers and end users 1 Service providers: Simplified software installation and maintenance Centralized control over versioning No need to build, provision, and maintain a datacenter On the fly scaling 2 End users: “Anytime, anywhere” access Share data and collaborate easily Safeguard data stored in the infrastructure (debatable) Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 5 / 22
  • 17. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 6 / 22
  • 18. History Phenomenal growth of Web services in late 90s and early 2000s Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
  • 19. History Phenomenal growth of Web services in late 90s and early 2000s Large Internet companies, including Amazon, eBay, Google, Microsoft, Yahoo, etc., already had massive infrastructure Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
  • 20. History Phenomenal growth of Web services in late 90s and early 2000s Large Internet companies, including Amazon, eBay, Google, Microsoft, Yahoo, etc., already had massive infrastructure To keep up with demand, these companies also developed scalable software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.) Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
  • 21. History Phenomenal growth of Web services in late 90s and early 2000s Large Internet companies, including Amazon, eBay, Google, Microsoft, Yahoo, etc., already had massive infrastructure To keep up with demand, these companies also developed scalable software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.) They also acquired the operational expertise to deter potential physical and electronic attacks Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
  • 22. History Phenomenal growth of Web services in late 90s and early 2000s Large Internet companies, including Amazon, eBay, Google, Microsoft, Yahoo, etc., already had massive infrastructure To keep up with demand, these companies also developed scalable software infrastructure (think MapReduce, GFS, BigTable, Dynamo, etc.) They also acquired the operational expertise to deter potential physical and electronic attacks Therefore, they had already created extremely large datacenters to leverage statistical multiplexing and bulk purchasing of infrastructure Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 7 / 22
  • 23. Incentive for providers Incentives include revenue, leveraging existing investment, defending a franchise, attacking an incumbent, leveraging customer relationships, and becoming a platform Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
  • 24. Incentive for providers Incentives include revenue, leveraging existing investment, defending a franchise, attacking an incumbent, leveraging customer relationships, and becoming a platform Data centers are being established in seemingly arbitrary locations Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
  • 25. Incentive for providers Incentives include revenue, leveraging existing investment, defending a franchise, attacking an incumbent, leveraging customer relationships, and becoming a platform Data centers are being established in seemingly arbitrary locations Reasons for choosing a location include costs of electricity, cooling, labour, property, and taxes Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
  • 26. Incentive for providers Incentives include revenue, leveraging existing investment, defending a franchise, attacking an incumbent, leveraging customer relationships, and becoming a platform Data centers are being established in seemingly arbitrary locations Reasons for choosing a location include costs of electricity, cooling, labour, property, and taxes Cooling and electricity account for 1/3rd of all costs! Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
  • 27. Incentive for providers Incentives include revenue, leveraging existing investment, defending a franchise, attacking an incumbent, leveraging customer relationships, and becoming a platform Data centers are being established in seemingly arbitrary locations Reasons for choosing a location include costs of electricity, cooling, labour, property, and taxes Cooling and electricity account for 1/3rd of all costs! Cheaper to ship data over fiber optic cables than to ship electricity over high-voltage transmission lines Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 8 / 22
  • 28. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 29. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” For instance: Payment model in Web 1.0: Contractual arrangement with a payment processing service such as VeriSign or Authorize.net; making it hard for small businesses to accept credit card payment online Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 30. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” For instance: Payment model in Web 1.0: Contractual arrangement with a payment processing service such as VeriSign or Authorize.net; making it hard for small businesses to accept credit card payment online Web 2.0: With PayPal-like services anyone can sign up and accept credit payments without a contract and a long-term commitment Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 31. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” For instance: Payment model in Web 1.0: Contractual arrangement with a payment processing service such as VeriSign or Authorize.net; making it hard for small businesses to accept credit card payment online Web 2.0: With PayPal-like services anyone can sign up and accept credit payments without a contract and a long-term commitment Another example: Ad revenue model in Web 1.0: Set up a relationship with an ad placement company, such as DoubleClick Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 32. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” For instance: Payment model in Web 1.0: Contractual arrangement with a payment processing service such as VeriSign or Authorize.net; making it hard for small businesses to accept credit card payment online Web 2.0: With PayPal-like services anyone can sign up and accept credit payments without a contract and a long-term commitment Another example: Ad revenue model in Web 1.0: Set up a relationship with an ad placement company, such as DoubleClick Web 2.0: Use Google AdSense Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 33. New technology trends and business models “High-touch, high-margin, high-commitment” provisioning of service to “low-touch, low-margin, low-commitment” For instance: Payment model in Web 1.0: Contractual arrangement with a payment processing service such as VeriSign or Authorize.net; making it hard for small businesses to accept credit card payment online Web 2.0: With PayPal-like services anyone can sign up and accept credit payments without a contract and a long-term commitment Another example: Ad revenue model in Web 1.0: Set up a relationship with an ad placement company, such as DoubleClick Web 2.0: Use Google AdSense This same model was used by Amazon Web Services in 2006: pay-as-you-go computing with no contract, with the only requirement being a credit card Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 9 / 22
  • 34. New applications Mobile applications: Require high availability and rely on large data sets that are most conveniently hosted in large datacenters Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
  • 35. New applications Mobile applications: Require high availability and rely on large data sets that are most conveniently hosted in large datacenters Parallel batch processing: Analytics jobs that analyze terabytes of data and can take hours to finish can leverage the “cost associativity” of the cloud Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
  • 36. New applications Mobile applications: Require high availability and rely on large data sets that are most conveniently hosted in large datacenters Parallel batch processing: Analytics jobs that analyze terabytes of data and can take hours to finish can leverage the “cost associativity” of the cloud Business analytics: Understanding customers, supply chains, buying habits, ranking, and so on Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
  • 37. New applications Mobile applications: Require high availability and rely on large data sets that are most conveniently hosted in large datacenters Parallel batch processing: Analytics jobs that analyze terabytes of data and can take hours to finish can leverage the “cost associativity” of the cloud Business analytics: Understanding customers, supply chains, buying habits, ranking, and so on Computation offloading: Compute-intensive tasks are offloaded to the cloud. For instance, Matlab, Mathematica, image rendering, 3D animations, etc. Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 10 / 22
  • 38. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 11 / 22
  • 39. Classes of utility computing Every application needs computation, storage, and quite possibly communication Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
  • 40. Classes of utility computing Every application needs computation, storage, and quite possibly communication These resources need to be virtualized to achieve elasticity and the illusion of infinite capacity Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
  • 41. Classes of utility computing Every application needs computation, storage, and quite possibly communication These resources need to be virtualized to achieve elasticity and the illusion of infinite capacity The details of statistical multiplexing and sharing is abstracted away from the programmer Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
  • 42. Classes of utility computing Every application needs computation, storage, and quite possibly communication These resources need to be virtualized to achieve elasticity and the illusion of infinite capacity The details of statistical multiplexing and sharing is abstracted away from the programmer Different utility computing offerings can be distinguished on the basis of the abstraction presented to the programmer Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 12 / 22
  • 43. Bare metal hardware abstraction An instance looks like physical hardware Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 44. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 45. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Employed by Amazon EC2 Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 46. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Employed by Amazon EC2 A very thin API is exposed to request and configure virtualized hardware Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 47. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Employed by Amazon EC2 A very thin API is exposed to request and configure virtualized hardware No bar on the kinds of applications that can be hosted Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 48. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Employed by Amazon EC2 A very thin API is exposed to request and configure virtualized hardware No bar on the kinds of applications that can be hosted Low level virtualization, block-device storage, and IP-level connectivity allow developers to design any application Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 49. Bare metal hardware abstraction An instance looks like physical hardware Programmers control the entire software stack from the kernel upwards Employed by Amazon EC2 A very thin API is exposed to request and configure virtualized hardware No bar on the kinds of applications that can be hosted Low level virtualization, block-device storage, and IP-level connectivity allow developers to design any application On the downside, scalability and failover are application-dependent Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 13 / 22
  • 50. Domain-specific platform Target traditional web applications Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 51. Domain-specific platform Target traditional web applications Enforce an application structure of clean separation between a stateless computation tier and a stateful storage tier Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 52. Domain-specific platform Target traditional web applications Enforce an application structure of clean separation between a stateless computation tier and a stateful storage tier Employed by Google AppEngine Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 53. Domain-specific platform Target traditional web applications Enforce an application structure of clean separation between a stateless computation tier and a stateful storage tier Employed by Google AppEngine Applications are expected to be request-reply based Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 54. Domain-specific platform Target traditional web applications Enforce an application structure of clean separation between a stateless computation tier and a stateful storage tier Employed by Google AppEngine Applications are expected to be request-reply based In contrast to the bare metal hardware abstraction, enable automatic scaling and high-availability mechanisms Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 55. Domain-specific platform Target traditional web applications Enforce an application structure of clean separation between a stateless computation tier and a stateful storage tier Employed by Google AppEngine Applications are expected to be request-reply based In contrast to the bare metal hardware abstraction, enable automatic scaling and high-availability mechanisms Not suitable for general-purpose computing Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 14 / 22
  • 56. Hybrid Offer a sweet spot between flexibility and programmer convenience Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 57. Hybrid Offer a sweet spot between flexibility and programmer convenience Offered by Microsoft’s Azure Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 58. Hybrid Offer a sweet spot between flexibility and programmer convenience Offered by Microsoft’s Azure Applications are written using .NET libraries and compiled to the Common Language Runtime (A language-independent management environment) Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 59. Hybrid Offer a sweet spot between flexibility and programmer convenience Offered by Microsoft’s Azure Applications are written using .NET libraries and compiled to the Common Language Runtime (A language-independent management environment) Supports general purpose computing Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 60. Hybrid Offer a sweet spot between flexibility and programmer convenience Offered by Microsoft’s Azure Applications are written using .NET libraries and compiled to the Common Language Runtime (A language-independent management environment) Supports general purpose computing Users have control over the choice of language but not the underlying OS or runtime Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 61. Hybrid Offer a sweet spot between flexibility and programmer convenience Offered by Microsoft’s Azure Applications are written using .NET libraries and compiled to the Common Language Runtime (A language-independent management environment) Supports general purpose computing Users have control over the choice of language but not the underlying OS or runtime Provide some degree of automatic failover and scalability but require some help from the developer in the form of declaration of some application properties Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 15 / 22
  • 62. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 16 / 22
  • 63. Elasticity Pay-as-you-go model: Only pay for what you use Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
  • 64. Elasticity Pay-as-you-go model: Only pay for what you use Add or remove resources at a fine grain (such as one server at a time) with minimal lead time Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
  • 65. Elasticity Pay-as-you-go model: Only pay for what you use Add or remove resources at a fine grain (such as one server at a time) with minimal lead time Useful for traffic spikes such as “Black Friday” Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
  • 66. Elasticity Pay-as-you-go model: Only pay for what you use Add or remove resources at a fine grain (such as one server at a time) with minimal lead time Useful for traffic spikes such as “Black Friday” Over time, hardware costs come down and vendors acquire updated hardware. Thus, benefiting the tenant Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 17 / 22
  • 67. Reasons for companies to migrate to the cloud Pay separately per resource: Pay proportional to resource requirements Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
  • 68. Reasons for companies to migrate to the cloud Pay separately per resource: Pay proportional to resource requirements Power, cooling, and physical plant costs: Cost of electricity and cooling already factored in Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
  • 69. Reasons for companies to migrate to the cloud Pay separately per resource: Pay proportional to resource requirements Power, cooling, and physical plant costs: Cost of electricity and cooling already factored in Man-power costs: No need to employ sysadmins Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
  • 70. Reasons for companies to migrate to the cloud Pay separately per resource: Pay proportional to resource requirements Power, cooling, and physical plant costs: Cost of electricity and cooling already factored in Man-power costs: No need to employ sysadmins Operational costs: Low-level upgrades and software patches responsibility of the provider Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 18 / 22
  • 71. Outline 1 Introduction 2 Cloud service providers 3 Utility Computing 4 Economics 5 Challenges Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 19 / 22
  • 72. Obstacles 1 Service availability: Possibility of cloud outage Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
  • 73. Obstacles 1 Service availability: Possibility of cloud outage 2 Data lock-in: Reliance on cloud specific APIs Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
  • 74. Obstacles 1 Service availability: Possibility of cloud outage 2 Data lock-in: Reliance on cloud specific APIs 3 Security: Requires strong encrypted storage, VLANs, and network middleboxes (firewalls, etc.) Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
  • 75. Obstacles 1 Service availability: Possibility of cloud outage 2 Data lock-in: Reliance on cloud specific APIs 3 Security: Requires strong encrypted storage, VLANs, and network middleboxes (firewalls, etc.) 4 Data transfer bottlenecks: Moving large amounts of data in and out is expensive Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
  • 76. Obstacles 1 Service availability: Possibility of cloud outage 2 Data lock-in: Reliance on cloud specific APIs 3 Security: Requires strong encrypted storage, VLANs, and network middleboxes (firewalls, etc.) 4 Data transfer bottlenecks: Moving large amounts of data in and out is expensive 5 Performance unpredictability: Resource sharing between applications Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 20 / 22
  • 77. Obstacles (2) 6 Scalable storage: No standard model to arbitrarily scale storage up and down on-demand while ensuring data durability and high availability Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
  • 78. Obstacles (2) 6 Scalable storage: No standard model to arbitrarily scale storage up and down on-demand while ensuring data durability and high availability 7 Bugs in large-scale distributed systems: Hard to debug large-scale applications in full deployment Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
  • 79. Obstacles (2) 6 Scalable storage: No standard model to arbitrarily scale storage up and down on-demand while ensuring data durability and high availability 7 Bugs in large-scale distributed systems: Hard to debug large-scale applications in full deployment 8 Scaling quickly: Automatically scaling while conserving resources and money is an open ended problem Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
  • 80. Obstacles (2) 6 Scalable storage: No standard model to arbitrarily scale storage up and down on-demand while ensuring data durability and high availability 7 Bugs in large-scale distributed systems: Hard to debug large-scale applications in full deployment 8 Scaling quickly: Automatically scaling while conserving resources and money is an open ended problem 9 Reputation fate sharing: Bad behaviour by one tenant can reflect badly on the rest Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
  • 81. Obstacles (2) 6 Scalable storage: No standard model to arbitrarily scale storage up and down on-demand while ensuring data durability and high availability 7 Bugs in large-scale distributed systems: Hard to debug large-scale applications in full deployment 8 Scaling quickly: Automatically scaling while conserving resources and money is an open ended problem 9 Reputation fate sharing: Bad behaviour by one tenant can reflect badly on the rest 10 Software licensing: Gap between pay-as-you-go model and software licensing Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 21 / 22
  • 82. References 1 Above the Clouds: A Berkeley View of Cloud Computing" by Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. Technical Report EECS-2009-28, EECS Department, University of California, Berkeley. Zubair Nabi 2: Cloud Computing Paradigms April 17, 2013 22 / 22