Professional Documents
Culture Documents
CEC315: INTRODUCTION TO
CLOUD COMPUTING
Enjoy Your Ride to the Cloud!
Module 3
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
1
CEC315: Introduction to Cloud Computing – Module 3
3.1 Introduction
In the first module, we saw how cloud computing evolved as illustrated in Figure 3-1 and had the
universally accepted definition of cloud computing by NIST which is a cloud model composed of five
essential characteristics, three service models, and four deployment models.
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
1
2
CEC315: Introduction to Cloud Computing – Module 3
The private cloud infrastructure is operated for the exclusive use of an organisation. The cloud may
be managed by that organisation or a third party. Private clouds may be either on or off-premises.
Benefits:
➢ Offer the highest degree of control over
➢ performance, reliability, and security.
Drawbacks:
➢ Do not provide the benefit of no up-front capital costs.
3.1.3 Hybrid Clouds
A hybrid cloud combines multiple clouds (private, community of public) where those clouds retain
their unique identities, but are bound together as a unit. A hybrid cloud may offer standardized or
proprietary access to data and applications, as well as application portability
A combination of public and private cloud models
➢ part of the service infrastructure runs in private clouds, the rest runs in public clouds.
➢ address the limitations of each approach.
➢ tighter control and security over application data compared to public clouds,
➢ on-demand service expansion and contraction.
Problem
➢ Designing a hybrid cloud requires carefully determining the best split between public and private
cloud components.
3.1.4 Community Clouds
A community cloud is one where the cloud has been organised to serve a common function or
purpose.
Examples: Healthcare, Education, and Religion, etc..
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
2
3
CEC315: Introduction to Cloud Computing – Module 3
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
3
4
CEC315: Introduction to Cloud Computing – Module 3
➢ GoGrid
➢ FlexiScale
➢ Linode
➢ RackSpace Cloud
➢ Terremark
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
4
5
CEC315: Introduction to Cloud Computing – Module 3
The client can deploy its applications on the cloud infrastructure or use applications that were
programmed using languages and tools that are supported by the PaaS service provider.
The service provider manages the cloud infrastructure, the operating systems, and the enabling
software. The client is responsible for installing and managing the application that it is deploying.
A PaaS service adds integration features, middleware, and other orchestration and choreography
services to the IaaS model.
Examples of PaaS services are:
➢ Force.com
➢ GoGrid CloudCenter
➢ Google AppEngine
➢ Windows Azure Platform
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
5
6
CEC315: Introduction to Cloud Computing – Module 3
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
7
8
CEC315: Introduction to Cloud Computing – Module 3
3.3.2 Ownership
Ownership: Proprietary (P)/Open (O) is a measure of not only the technology ownership, but of
interoperability, ease of data transfer, and degree of vendor application lock-in an organisation’s
servers.
This is the dimension that defines the state of ownership of the cloud technology, services,
interfaces, etc. It indicates the degree of interoperability, as well as enabling “data/application
transportability” between your own systems and other cloud forms, and the ability to withdraw
your data from a cloud form or to move it to another without constraint. It also indicates any
constraints on being able to share applications.
Proprietary means that the organisation providing the service is keeping the means of provision
under their ownership. As a result, when operating in clouds that are proprietary, you may not be
able to move to another cloud supplier without significant effort or investment. Often the more
innovative technology advances occur in the proprietary domain. As such the proprietor may
choose to enforce restrictions through patents and by keeping the technology involved a trade
secret.
Clouds that are Open are using technology that is not proprietary, meaning that there are likely to
be more suppliers, and you are not as constrained in being able to share your data and collaborate
with selected parties using the same open technology. Open services tend to be those that are
widespread and consumerized, and most likely a published open standard, for example email
(SMTP).
An as yet unproven premise is that the clouds that most effectively enhance collaboration between
multiple organisations will be Open
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
8
9
CEC315: Introduction to Cloud Computing – Module 3
The third dimension represents the “architectural mindset” – are you operating inside your
traditional IT perimeter or outside it? De-perimeterisation has always related to the gradual
failure/removal/shrinking/collapse of the traditional silo-based IT perimeter.
Perimeterised implies continuing to operate within the traditional IT perimeter, often signaled by
“network firewalls”.
In effect, when operating in the perimeterised areas, you may simply extend your own organisation’s
perimeter into the external cloud computing domain using a VPN and operating the virtual server
in your own IP domain, making use of your own directory services to control access. Then, when
the computing task is completed, you can withdraw your perimeter back to its original traditional
position. We consider this type of system perimeter to be a traditional, though virtual, perimeter.
De-perimeterised, assumes that the system perimeter is architected following the principles outlined
in the Jericho Forum’s Commandments and Collaboration Oriented Architectures Framework. The
terms Micro-Perimeterisation and Macro-Perimeterisation will likely be in active use here – for
example in a de-perimeterised frame the data would be encapsulated with meta-data and
mechanisms that would protect the data from inappropriate usage.
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
9
10
CEC315: Introduction to Cloud Computing – Module 3
be embodied in a contract with the cloud provider. In the Cloud Cube Model diagram we show this
4th dimension by 2 colors; any of the 8 cloud forms can take either color.
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
10
11
CEC315: Introduction to Cloud Computing – Module 3
Figure 3-9: Some entities can be both users and providers for other users.
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
13
14
CEC315: Introduction to Cloud Computing – Module 3
In addition, it can allow other advanced features, including the creation of cross-site networks, cross-
site migration of VMs, implementation of high availability techniques among remote cloud instances,
and creation of virtual storage systems across site boundaries.
3.5.4 Bursting (Hybrid) Architecture
Cloud bursting or hybrid architecture combines the existing onpremise infrastructure (usually a private
cloud) with remote resources from one or more public clouds to provide extra capacity to satisfy peak
demand periods.
Because the local cloud OS has no advanced control over the virtual resources deployed in external
clouds beyond the basic operations the providers allow, this architecture is loosely coupled. Most
existing open cloud managers support the hybrid cloud architecture and is used in infrastructures such
as StratusLab (http://stratuslab.eu).
3.5.5 Broker Architecture
The central component of the broker architecture is a broker that serves various users and has access
to several public cloud infrastructures. A simple broker should be able to deploy virtual resources in
the cloud as selected by he user.
An advanced broker offering service management capabilities could make scheduling decisions based
on optimization criteria such as cost, performance, or energy consumption to automatically deploy
virtual user service in the most suitable cloud, or it could even distribute the service components across
multiple clouds. This architecture is also loosely coupled since public clouds typically do not allow
advanced control over the deployed virtual resources.
Brokering is the most common federation scenario. Examples include BonFIRE (www.bonfire-
project.eu), Open Cirrus, and FutureGrid ( http://futuregrid.org).email accounts, their LinkedIn
account, their MySpace page, and so forth.
3.5.6 Aggregated Architecture
Cloud aggregation consists of two or more partner clouds that interoperate to aggregate their resources
and provide users with a larger virtual infrastructure. This architecture is usually partially coupled,
since partners could be provided with some kind of advanced control over remote resources, depending
on the terms and conditions of contracts with other partners.
These partner clouds usually have a higher coupling level when they belong to the same corporation
than when they are owned by different companies that agree to cooperate and aggregate their
resources. The Reservoir federated infrastructure is an example of an aggregated cloud architecture.
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
14
15
CEC315: Introduction to Cloud Computing – Module 3
Figure 3-13: Cloud Federation Architectures: (a) Bursting (Hybrid); (b) Broker; (c)Aggregated; (d)
Mulitier
Copyright ©Kometa Denis; komtanis@gmail.com; Dpt. of Com. Engineering, COT, University of Buea, 2021
15