You are on page 1of 71

Cloud Computing

(Professional Elective-V)/(Common to CSE & IT)


Course Code : 15CT1137

VII Sem Elective

Prepared by Jyotsna Meegada


DinkarSitaram, GeethaManjunath, “Moving to the Cloud: Developing Apps in the New World of Cloud Computing”, 1stEdition, 1
Elsevier,2012
Course Outcomes
At the end of the Course, the Student will be able to:

CO 1 Summarize importance of cloud computing in real world.


CO 2 Identify applications that can be integrated using cloud
services.
CO 3 Evaluate cloud based applications.
CO 4 Understand the security issues in cloud services.
CO 5 Identify the cloud services managing.

2
Unit 1 Contents

INTRODUCTION:
Where Are We Today, What Is Cloud Computing, Cloud Deployment Models,
Private vs. Public Clouds, Business Drivers for Cloud Computing, Introduction
to Cloud Technologies

INFRASTRUCTURE AS A SERVICE:
Storage as a Service: Amazon Storage Services, Compute as a Service:
Amazon Elastic Compute Cloud (EC2), HP CloudSystem Matrix,
Cells-as-a-Service.

3
Topics to be discussed
What is Cloud Computing?

Background of Cloud Computing and Evolution

Definition of Cloud Computing

Cloud Characteristics

Cloud Deployment Models

Cloud Service Models

Advantages of Cloud Computing

Disadvantages of Cloud Computing 4


What is Cloud Computing
Cloud computing is basically delivering computing at the Internet
scale.

Compute, storage, networking infrastructure as well as


development and deployment platforms are made available
on-demand within minutes.

5
What is Cloud Computing
A cloud is nothing but a huge pool of easily accessible and usable computing
resources (like networking components, storage units, computing units and
others) which must be available to the intended users round the clock and
across the globe over the internet on pay-per-use basis.

The computing must provide the resources scalability feature so that they
must be reconfigurable on the basis of load to support the concept of
resource usage optimization.

6
Evolution of Cloud Computing

7
Cloud Computing Definition
As per NIST, cloud computing is described as follows:

“Cloud computing is a model for enabling convenient,


on-demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned
and released with minimal management effort or service
provider interaction.”

8
9
Characteristics of a Cloud Computing Infrastructure
On demand self-service

Broad network access

Resource pooling

Rapid elasticity

Measured service

10
Characteristics of a cloud computing infrastructure
On demand self-service: This feature enables the cloud
service user (CSU) to request and manage the computing
capabilities like server time, network storage etc. without any
human intervention from cloud service provider (CSP) as and
when needed.

Broad network access: Ubiquitous access to cloud applications


from desktops, laptops to mobile devices is critical to the
success of a Cloud platform.
11
Characteristics of a cloud computing
infrastructure..contd
Resource pooling: The provider’s computing resources are pooled
to serve multiple consumers. Resources can be dynamically
assigned and reassigned according to customer demand.

Rapid elasticity: A cloud platform should be able to rapidly


increase or decrease computing resources as needed.

To the customer this appears seamless, limitless, and responsive


to their changing requirements.
12
Characteristics of a cloud computing
infrastructure..contd
Measured service: One of the compelling business use cases for
cloud computing is the ability to “pay as you go,” where the
consumer pays only for the resources that are actually used by his
applications.

There is a metering concept where customer resource usage can


be monitored, controlled, and reported, providing transparency for
both the provider and consumer of the utilized service.

13
CLOUD SERVICE MODELS
The three cloud service types defined by NIST are

Infrastructure as a Service IaaS


provides compute and storage resources as a service.

Platform as a Service PaaS


provide a system stack or platform for application deployment as
a service.

Software as a Service SaaS


provides the complete application as a service.

14
CLOUD SERVICE MODELS..Contd

15
CLOUD DEPLOYMENT MODELS
A deployment model defines the purpose of the cloud and the
nature of how the cloud is located.

The NIST definition for the four deployment models is as follows:

PUBLIC CLOUD : The Public Cloud allows systems and services to


be easily accessible to the general public. Public cloud may be less
secure because of its openness, e.g., e-mail.

16
CLOUD DEPLOYMENT MODELS...contd
PRIVATE CLOUD : The Private Cloud allows systems and services to
be accessible within an organization. It offers increased security
because of its private nature.

COMMUNITY CLOUD : The community cloud is one where the cloud


has been organized to serve a common function or purpose.

It may be for one organization or for several organizations.

HYBRID CLOUD : The Hybrid Cloud is mixture of public and private


cloud.
17
CLOUD DEPLOYMENT MODELS...contd

18
ADVANTAGES OF CLOUD
• Lower computer costs • Improved performance:

• Reduced software costs • Instant software updates

• Improved document format compatibility

• Unlimited storage capacity • Increased data reliability

• Universal document access • Latest version availability

• Easier group collaboration • Device independence


19
DISADVANTAGES OF CLOUD
• Requires a constant Internet connection

• Does not work well with low-speed connections

• Can be slow

• Security Concerns

20
INFRASTRUCTURE AS A SERVICE (IaaS)
According to NIST, IaaS is defined as follows:
The capability provided to the consumer is to provision processing,
storage, networks, and other fundamental computing resources where
the consumer is able to deploy and run arbitrary software, which can
include operating systems and applications. The consumer does not
manage or control the underlying cloud infrastructure but has control
over operating systems, storage, deployed applications, and possibly
limited control of select networking components (e.g., host firewalls). 21
IaaS Service Providers
Amazon Web Services(AWS)
Microsoft Azure
Google Compute Engine (GCE)
Cisco Metapod
Eucalyptus
GoGrid
FlexiScale
Linode
RackSpace Cloud
Terremark

22
INFRASTRUCTURE AS A SERVICE (IaaS)
❖ Storage as a Service: Amazon Storage Services

❖ Compute as a Service: Amazon Elastic Compute Cloud

(EC2)

❖ HP CloudSystem Matrix

❖ Cells-as-a-Service

23
Storage as a Service (StaaS)
Amazon Storage Services

• Simple Storage Service (S3): An object store

• SimpleDB: A Key-value store

• Relational Database Service (RDS): MySQL instance

24
AWS Console

25
1.Amazon S3
Amazon Simple Storage Service (Amazon S3) is an object storage service
that is highly reliable, highly available, scalable and fast storage in the cloud
for storing and retrieving large amounts of data just through simple web
services.

❖ Accessing S3
❖ Getting Started with S3
❖ Organizing Data In S3: Buckets, Objects and Keys
❖ S3 Administration
❖ Large Objects and Multi-part Uploads

26
Accessing S3
There are 3 ways of accessing Amazon S3

1. AWS Console

via http://aws.amazon.com/console.

2. Amazon’s RESTful API

For use of S3 within applications, Amazon provides a REST-ful API


with familiar HTTP operations such as GET, PUT, DELETE, and HEAD.

3. SDKs for Ruby and other languages

there are libraries and SDKs for various languages that abstract
these operations. 27
Getting Started with S3
1. Sign up for S3 at http://aws.amazon.com/s3/. While signing up, obtain the
AWS Access Key and the AWS Secret Key. These are similar to userid and
password that is used to authenticate all transactions with Amazon Web
Services (not just S3).

2. Sign in to the AWS Management Console for S3 at


https://console.aws.amazon.com/s3/home.

3. Create a bucket, giving a name and geographical location where it can be


stored. In S3 all files (called objects) are stored in a bucket,
which represents a collection of related objects.
28
Creating a Bucket

29
Getting Started with S3 ..CONTD
4. Click the Upload button and follow the instructions to upload files.

5. The photos or other files are now safely backed up to S3 and available for

sharing with a URL if the right permissions are provided.

30
Uploading Objects

31
Organizing Data In S3: Buckets, Objects and Keys
➔ Files are called objects in S3.
➔ Objects are referred to with keys
➔ Objects in S3 are replicated across multiple geographic locations
to make it resilient to several types of failures
➔ S3 objects can be up to 5 Terabytes in size and there are no
limits on the number of objects that can be stored.
➔ All objects in S3 must be stored in a bucket.

32
S3 Administration
❖ Security
➢ Access Control
➢ Audit Logs
❖ Data protection
➢ Versioning: If versioning is enabled on a bucket, then S3
automatically stores the full history of all objects in the bucket from
that time onwards. The object can be restored to a prior version, and
even deletes can be undone.
➢ Regions: For performance, legal and other reasons, it may be
desirable to have S3 data running in specific geographic locations.
This can be accomplished at the bucket level by selecting the region
that the bucket is stored in during its creation.
33
Access Control from AWS Console

34
Amazon S3 Bucket Logging

35
Large Objects and Multi-part Uploads
Object size limit for S3 is 5 terabytes

Object can be stored in smaller chunks with splitting and re-composition


being managed in the application, using the data, if the object is larger than
5TB

Multi-part uploads solves the problem of an upload fails.

36
2.Amazon ❖ Amazon SimpleDB is a highly available,
scalable, and flexible non-relational data
SimpleDB (SDB) store that enables you to store and query
data items using web service requests.

❖ This service works in close conjunction


with Amazon Simple Storage Service
(Amazon S3) and Amazon Elastic Compute
Cloud (Amazon EC2), collectively providing
the ability to store, process and query
data sets in the cloud.
37
Data Organization and Access
❖ Data in SDB is organized into domains.
❖ Each item in a domain has a unique key that must be
provided during creation.
❖ Each item can have up to 256 attributes, which are
name-value pairs.
❖ SDB provides a query language that is analogous to SQL

38
❖ Amazon Relational
Database Service (RDS)
provides a traditional
database abstraction in the
3.Amazon Relational cloud

Database Service
(RDS) ❖ An RDS instance can be
created using the RDS tab
in the AWS Management
Console

39
AWS console: relational database service

40
Amazon Relational Database Service (RDS) ..contd
❖ AWS performs many of the administrative tasks associated
with maintaining a database for the user.
❖ The database is backed up at configurable intervals,which can
be as frequent as 5 minutes.
❖ Amazon also provides the capability to snapshot the database
as needed.
❖ All of these administrative tasks can be performed through
the AWS console

41
❖ Amazon EC2 allows enterprises
COMPUTE AS A to define a virtual server, with
SERVICE: AMAZON virtual storage and virtual
ELASTIC COMPUTE networking.
CLOUD (EC2) ❖ The diversity in the compute
hardware, with automatic
maintenance and ability to
handle the scale,makes Amazon
EC2 a unique platform
42
❖ EC2 can be accessed Using AWS
Console at
Accessing http://aws.amazon.com/console.

EC2
Using ❖ Clicking on the “Launch Instance” allows
to create an instance where a set of
AWSConsole supported operating system images
(called Amazon Machine Images, AMI)
are shown to choose from.

43
44
45
46
47
Installing EC2 command line
tools

❖ Download tools
Accessing EC2 Using ❖ Set environment
variables (e.g., location
Command Line of JRE)

Tools ❖ Set security


environment (e.g., get
certificate)
❖ Set region

48
Set environment variables:
For Linux:
$export JAVA_HOME=PATHNAME
$export EC2_TOOLS=TOOLS_PATHNAME
$export PATH=$PATH:$EC2_HOME/bin
For Windows:
C:\>SET JAVA_HOME=PATHNAME
C:\>SET EC2_TOOLS=TOOLS_PATHNAME
C:\>SET PATH=%PATH%,%EC2_HOME%\bin 49
Set up security environment:
So That the EC2 command line utilities can authenticate to AWS
during each interaction. To do this, it is necessary to download an
X.509 certificate and private key that authenticates HTTP requests
to Amazon.

$export EC2-CERT=~/.ec2/f1.pem

or

C:\> set EC2-CERT=~/.ec2/f1.pem

50
Set region:
It is necessary to next set the region that the EC2 command tools
interact with – i.e., the location in which the EC2 virtual machines
would be created.

Each region represents an AWS data center

The default region used is the US-East region “us-east-1”

$export EC2-URL=https://<ENDPOINT_URL>
Or
C:\> set EC2-URL =https://<ENDPOINT_URL>
51
EC2
❖ The computing resources available on
EC2, referred to as EC2 instances,

Computational consist of combinations of computing


power, together with other resources
Resources such as memory.
❖ Amazon measures the computing power
of an EC2 instance in terms of EC2
Compute Units
❖ An EC2 Compute Unit (CU) is a standard
measure of computing power in the same
way that bytes are a standard measure
of storage.
52
Computing resources:
Amazon recommends the EC2 instances that belong to the Standard Instance
family for most applications

53
Software:
❖ Amazon makes available certain standard combinations of
operating system and application software in the form of
Amazon Machine Images (AMIs).
❖ The required AMI has to be specified when requesting the
EC2 instance, as seen earlier. The AMI running on an EC2
instance is also called the root AMI.
❖ Can also add additional software not available in standard
AMIs.

54
Regions and Availability Zones:
❖ EC2 offers regions, which are the same as the S3
regions
❖ Within a region, there are multiple availability zones,
where each availability zone corresponds to a virtual
data center

55
Load Balancing and Scaling:
❖ EC2 provides the Elastic Load Balancer, which is a
service that balances the load across multiple
servers
❖ The load balancer also scales the number of servers
up or down depending upon the load.
❖ If the load on the remaining server is too high, the
Elastic Load Balancer could start a new server
instance.
56
There are two types of block storage resources:
EC2 Storage Elastic Block Service, and instance storage

Resources Elastic Block Service (EBS):

It is possible to request an EBS disk volume of a


particular size and attach this volume to one or
multiple EC2 instances using the instance ID.

Unlike the local storage assigned during the


creation of an EC2 instance, the EBS volume is
independent of any EC2 instance.

Amazon EBS enables you to keep data


persistently on a file system, even after you shut
down your EC2 instance. 57
EC2 Storage Resources ..contd
Instance Storage:

❖ Every EC2 instance has local storage that can be configured as a


part of the compute resource and this is referred to as instance
storage.
❖ Instance storage exists only as long as the EC2 instance exists,
and cannot be attached to any other EC2 instance.
❖ if the EC2 instance is terminated, the instance storage does not
exist.
❖ To overcome this limitation of local storage, developers can use
either EBS or S3 for persistent storage and sharing.

58
59
For networking between EC2 instances, EC2
offers both a public address as well as a
private address.

EC2 It also offers DNS services for managing DNS


names associated with these IP addresses.
Networking Terminologies of EC2 Networking:
Resources ❖ Private and public IP addresses
❖ Elastic IP addresses
❖ Route 53 DNS that allows simple URLs (e..g.
www.mywebsite.com)
❖ Security groups for networking security
policies 60
Instant Addresses:
❖ Each EC2 instance has two IP addresses associated with
it – the public IP address and the private IP address.
❖ The private IP address and DNS name can be resolved
only within the EC2 cloud, for communication between
EC2 instances
❖ The public IP address and DNS name can be used for
communication outside the Amazon cloud.

61
Elastic IP addresses:
❖ Elastic IP addresses are independent of any instance
❖ These can be dynamically assigned and are associated
with a particular Amazon EC2 account (in which case, the
public IP address is de-assigned)
❖ These are useful for implementing failover. Upon failure
of one EC2 instance, the Elastic IP address can be
dynamically assigned to another EC2 instance.

62
Route 53:
Amazon Route 53 is a highly available and scalable cloud Domain
Name System (DNS) web service.

It is designed to give developers and businesses an extremely


reliable and cost effective way to route end users to Internet
applications by translating names like www.example.com into
the numeric IP addresses like 192.0.2.1 that computers use to
connect to each other.

Amazon Route 53 is fully compliant with IPv6 as well.


63
Security Groups:
❖ For networking security, it is common to define network
security policies that restrict the ports through which any
machine can be accessed, or the IP addresses that can access
a server.
❖ The same can be achieved for EC2 instances using security
groups, briefly mentioned earlier.
❖ Each security group is a collection of network security
policies.
❖ Different security groups should be created for different
server types
64
❖ HP CloudSystem Matrix is an
HP important IaaS offering from

CLOUDSYSTEM HP
❖ CloudSystem Matrix is part of
MATRIX the CloudSystem Automation
Suite of products, which
includes three IaaS products,
namely, CloudSystem Matrix,
CloudSystem Enterprise and
CloudSystem Service Provider 65
HP CloudSystem Matrix ...contd

CloudSystem Matrix: A product that enables IaaS as a private


cloud solution as well as it allows customers to perform basic
infrastructure and application provisioning and management.

CloudSystem Matrix HP product that combines server, network,


storage and management components in an integrated offering.

66
Basic Platform Features of HP CloudSystem Matrix
The fundamental elements of the CloudSystem Matrix IaaS
interfaces are:

1. Service Catalog
2. Consumer Portal (self-service interface)
3. One or more shared resource pools
4. Service template design and authoring tools
5. Administrator Portal containing tools for group, resource
capacity, usage and maintenance management.
67
❖ Cells-as-a-Service is a research

Cells-As-A-
prototype from HP Laboratories
❖ Cells-as-a-Service prototype

Service
(simply referred to as Cells for
short) was built to support
multitenanted services for complex
services.
❖ A unique feature of the Cells
prototype is its ability to define
templates for such complex
systems and enable easy
deployment 68
Introduction to Cells-as-a-Service
● Cell is an abstraction for a set of virtual machines interconnected
to deliver a service.
● A Service Template (ST) is a template describing the
infrastructure (including both software and hardware) that is
required to realize a service. Since it is a template, various
parameters, such as the number of servers needed, may not be
specified.
● A Service User (SU) is the consumer of a service

69
Introduction to Cells-as-a-Service
● Service Provider (SP) is the person who acquires the resources to host
the service, and then configures and runs the service is a Service
Provider (SP).
● Compute Service Provider (CSP): is the entity from which the service
provider acquires the resources by supplying the Service Template is
called the Compute Service Provider (CSP).

A Cell Specification (CS) specifies the structure of a particular cell that


implements a service.

If a particular type of service is instantiated multiple times, it is useful to


have an ST that describes the service, and then derive a CS from it as
needed.
70
THANK YOU
End of UNIT 1

71

You might also like