You are on page 1of 27

Cloud Computing

Presentation on:

Cloud Computing

Under the Guidance :


Mrs. Sudha Gupta
( Associate Professor )

Presented By :
Durgesh Kumar Jaiswal
M.E. ( ETRX ) 1st year
Roll No. 1402006
Ashish Nanoti
M.E. ( ETRX ) 1st year
Roll No. 1402009
Department of Electronics Engineering

Cloud Computing

Subwaves within the information


age

Cloud Computing

Why Cloud?
Cloud computing is a low-cost solution.
Cloud computing offers responsiveness and flexibility.
The IT expense matches the transaction volumes.
Business users are in direct control of technology
decisions.
The line between home computing applications and
enterprise applications will blur.

Cloud Computing

Worldwide IT cloud services


spending

Cloud Computing

Evolution of Cloud Computing

Cloud Computing

Evolution of Cloud Computing


(cont.)
ISP 1.0

ISPs quickly proliferated to provide access to the Internet


for organizations and individuals.

These early ISPs merely provided Internet connectivity for


users and small businesses, often over dial-up telephone
service.

ISP2.0
ISPs consolidated and searched for other value-added
services, such as providing access to email and to servers
at their facilities.

Cloud Computing

Evolution of Cloud Computing


(cont.)

ISP3.0

Colocation facilities: specialized facilities for hosting


organizations (customers) servers, along with the infrastructure
to support them and the applications running on them.

Those facilities are a type of data center where multiple


customers locate network, server, and storage gear and
interconnect to a variety of telecommunications and other
network service provider(s) with a minimum of cost and
complexity.

Cloud Computing

Evolution of Cloud Computing


(cont.)
ISP4.0

Application Service Providers (ASPs), focusing on a higher


value-added service of providing specialized applications
for organizations, and not just the computing
infrastructure.

ASPs typically owned and operated the software


application(s) they provided, as well as the necessary
infrastructure.

Cloud Computing

Cloud Computing (ISP5.0)

Although ASPs usually provided services to multiple customers (just


as SaaS providers do today), they did so through dedicated
infrastructures. Each customer had its own dedicated instance of an
application, and that instance usually ran on a dedicated host or
server.

The important difference between SaaS providers and ASPs is that


SaaS providers offer access to applications on a shared, not
dedicated, infrastructure.

Cloud Computing

Cloud Computing Defined


Properties

Descriptions

Multi-tenancy
(shared
resources)

cloud computing is based on a business model in which resources are


shared at the network level, host level, and application level.

Massive
scalability

cloud computing provides the ability to scale to tens of thousands of


systems, as well as the ability to massively scale bandwidth and
storage space

Elasticity

Users rapidly increase and decrease their computing resources as


needed, as well as release resources for other uses when they are no
longer required.

Pay as you go

Users pay for only the resources they actually use and for only the
time they require them.

Self-provisioning
of resources

Users self-provision resources, such as additional systems (processing


capability, software, storage) and network resources

10

Cloud Computing

Attributes of
Elasticity

11

Cloud Computing

SPI Service Model

12

Cloud Computing

Architecture
for Relevant
Technologies

13

Cloud Computing

Cloud Services Delivery Model

14

Cloud Computing

Saas, PaaS, IaaS

15

Cloud Computing

Cloud Deployment Model


Private Clouds
Public Clouds
Hybrid Clouds

16

Cloud Computing

Public Clouds

17

Cloud Computing

Hybrid Clouds

18

Cloud Computing

Key Drivers to Adopting Clouds

Small Initial Investment


and Low Ongoing Costs

Open Standards

Sustainability

Economies of Scale

19

Cloud Computing

Common Features of Cloud


Providers
Development
Environment:

Production
Environment

IDE, SDK, Plugins

Simple
storage

Table Store
<key, value>

Drives

Accessible through
Web services

Management Console and Monitoring tools


& multi-level security
20

Cloud Computing

Windows Azure

Enterprise-level on-demand capacity builder

Fabric of cycles and storage available on-request for a


cost

You have to use Azure API to work with the


infrastructure offered by Microsoft

Significant features: web role, worker role , blob


storage, table and drive-storage

21

Cloud Computing

Amazon EC2

Amazon EC2 is one large complex web service.

EC2 provided an API for instantiating computing instances


with any of the operating systems supported.

It can facilitate computations through Amazon Machine


Images (AMIs) for various other models.

Signature features: S3, Cloud Management Console, Map


-Reduce Cloud, Amazon Machine Image (AMI)

Excellent distribution, load balancing, cloud monitoring


tools
22

Cloud Computing

Google App Engine

This is more a web interface for a development environment that


offers a one stop facility for design, development and deployment
Java and Python-based applications in Java, Go and Python.

Google offers the same reliability, availability and scalability at


par with Googles own applications

Interface is software programming based

Comprehensive programming platform irrespective of the size


(small or large)

Signature features: templates and apps pot, excellent monitoring


and management console

23

Cloud Computing

Barriers to Cloud Computing Adoption in


the Enterprise

Security

Economic Value

Privacy

Connectivity and Open


Access

Changes in the IT
Organization

IT Governance

Reliability

Interoperability

Political Issues Due to


Global Boundaries

Independence from Cloud


Service Providers

24

Cloud Computing

Complexity of security in cloud


environment

25

Cloud Computing

Security Issues in Service


Models

Security in SaaS

Enterprises lack of visibility


about the way their data is
stored and secured.

Security in PaaS

A developer can tap to


build their applications
without having any clue
about what is going on
underneath the service.

A hacker can leverage the


PaaS cloud infrastructure
for malware command
and control and go behind
IaaS applications.

Security in IaaS

IaaS only provides basic


security (perimeter
firewall, load balancing,
etc.)

Applications moving into


the cloud will need higher
levels

26

Cloud Computing

Thank you!!

27