Upload
naveenchintu
View
216
Download
0
Embed Size (px)
Citation preview
8/12/2019 55256765 Cloud Computing Foundation
1/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 1
2009 EMC Corporation. All rights reserved.
Cloud Computing FoundationsCloud Computing Foundations
Welcome to Cloud Computing Foundation.
The AUDIO portion of this course is supplemental to the material and is not a replacement for the student notes accompanying
this course.EMC recommends downloading the Student Resource Guide from the Supporting Materials tab, and reading the notes in theirentirety.
Copyright 2009 EMC Corporation. All rights reserved.
These materials may not be copied without EMC's written consent.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to changewithout notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NOREPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THISPUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESSFOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC , EMC, EMC ControlCenter, AdvantEdge, AlphaStor, ApplicationXtender, Avamar, Captiva, Catalog Solution, Celerra,Centera, CentraStar, ClaimPack, ClaimsEditor, ClaimsEditor, Professional, CLARalert, CLARiiON, ClientPak, CodeLink,Connectrix, Co-StandbyServer, Dantz, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, Document Sciences,Documentum, EmailXaminer, EmailXtender, EmailXtract, enVision, eRoom, Event Explorer, FLARE, FormWare, HighRoad,InputAccel,InputAccel Express, Invista, ISIS, Max Retriever, Navisphere, NetWorker, nLayers, OpenScale, PixTools,Powerlink, PowerPath, Rainfinity, RepliStor, ResourcePak, Retrospect, RSA, RSA Secured, RSA Security, SecurID,SecurWorld, Smarts, SnapShotServer, SnapView/IP, SRDF, Symmetrix, TimeFinder, VisualSAN, VSAM-Assist, WebXtender,where information lives, xPression, xPresso, Xtender, Xtender Solutions; and EMC OnCourse, EMC Proven, EMC Snap, EMCStorage Administrator, Acartus, Access Logix, ArchiveXtender, Authentic Problems, Automated Resource Manager, AutoStart,AutoSwap, AVALONidm, C-Clip, Celerra Replicator, CLARevent, Codebook Correlation Technology, Common InformationModel, CopyCross, CopyPoint, DatabaseXtender, Digital Mailroom, Direct Matrix, EDM, E-Lab, eInput, Enginuity, FarPoint,FirstPass, Fortress, Global File Virtualization, Graphic Visualization, InfoMover, Infoscape, MediaStor, MirrorView, Mozy,MozyEnterprise, MozyHome, MozyPro, NetWin, OnAlert, PowerSnap, QuickScan, RepliCare, SafeLine, SAN Advisor, SANCopy, SAN Manager, SDMS, SnapImage, SnapSure, SnapView, StorageScope, SupportMate, SymmAPI, SymmEnabler,Symmetrix DMX, UltraFlex, UltraPoint, UltraScale, Viewlets, VisualSRM are trademarks of EMC Corporation.
All other trademarks used herein are the property of their respective owners.
8/12/2019 55256765 Cloud Computing Foundation
2/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 2
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 2
Course Objectives
Upon completion of this course, you will be able to:
Define and understand cloud computing, Its types,benefits, and services
Discuss cloud infrastructure and its components
Evaluate the suitability and processes of migrating tocloud
Describe challenges and concerns with the cloudcomputing
Describe EMC positioning and products for cloudcomputing
Explain the prospects of cloud computing
The objectives for this course are shown here. Please take a moment to read them.
8/12/2019 55256765 Cloud Computing Foundation
3/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 3
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 3
In This Course
This course contains the following modules:
1. Introduction to cloud computing2. Cloud Infrastructure
3. Migration to cloud
4. Concerns and challenges of cloud
5. EMCs role and strategies
6. Future and vision of cloud computing
Additional Information: EMC Atmos: Whiteboard discussion
This course contains 6 modules and a whiteboard discussion on EMC Atmos.
The modules are: Introduction to cloud computing, cloud infrastructure, migration to cloud,cloud concerns and challenges, EMCs role and strategies, and lastly future and vision of cloud
computing.
8/12/2019 55256765 Cloud Computing Foundation
4/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 4
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 4
Module 1: Introduction to Cloud Computing
Upon completion of this module, you will be able to:
Define cloud computing and cloud offerings Discuss the background of cloud computing
Describe common cloud service models
Software-as-a-Service (SaaS)
Platform-as-a-Service (PaaS)
Infrastructure-as-a-Service (Iaas)
Discuss private, public and hybrid cloud
Detail the benefits of cloud computing
The objectives for this module are shown here. Please take a moment to read them.
8/12/2019 55256765 Cloud Computing Foundation
5/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 5
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 5
Organization Needs New Computing Resources
Keep adding servers, storage,connectivity components, HVACsystems
Increase Data Center (DC) resourceutilization beyond physical limit
CAPEX
Extend virtualization beyond enterprise DC On-demand, self service requesting,
metered
Can hire computing resources from cloudservice provider
Pay-as-you-go (chargeback)
No CAPEX
IT Today With Cloud
Department ADepartment B
Department C
Backup
Storage
iSCSI, NAS, SAN
VMs VMs
ComputeApps &
Department A
Department B
Department C
Archive
Existing Computing PracticesExpand organizations infrastructure
New Generation Computing
Cloud Computing
Increased dependency on online information leads to on-demand, reliable, secured, and speedy
access to petabytes of information, which is further growing exponentially. Businesses must
align themselves to accommodate this astonishing growth much faster than ever, which requires
multi-fold increase in capacity or capability on the fly. The existing computing practices to meet
this demand is invest and expand infrastructure, i.e., keep adding servers, storage and other
necessary elements. The procurement and provisioning of these resources typically take a long
time, which may impact the service levels demanded by the customer. Many organizations
deploy server, storage, and network virtualization in a regional basis, or within a datacenter,
which results in discrete virtual computing environments leveraged by various departments of an
organization across the globe. Virtualization improves resource utilization, however this
advantage can be envisaged only for limited period because of its discrete implementation,
beyond which organizations have to scale up their expenditure to add new resources.
These long standing pain points can be outdated with the emergence of a new computing
technology called cloud computing. Cloud computing brings up a new generation of computing
which enables an organization extend virtualization beyond its enterprise datacenter by
aggregating IT resources scattered across the globe. Location independent virtual image of
aggregated resources can be created and assigned dynamically on-demand with a metering
service to monitor and report resource consumption. Cloud computing allows self service
requesting empowered by fully automated request fulfillment process in the background.
Organizations can build their own cloud by pooling and virtualizing distributed resources, as
well as hiring computing resources from cloud service providers, and pay based on resourceusage such as CPU hours used, amount of data transferred, and gigabytes of data stored.
8/12/2019 55256765 Cloud Computing Foundation
6/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 6
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 6
What is Cloud Computing?
Cloud computing is a style of computing where massively scalable IT-related
capabilities are provided as a service across the internet to multiple external
customers. - Gartner
A pool of abstracted, highly scalable, and managed infrastructure
capable of hosting end-customer applications and billed by consumption.
- Forrester Research
Cloud is a model for enabling convenient, on-demand network access to sharedpool of configurable computing resources (e.g. networks, servers, storage,
applications) that can be rapidly provisioned & released with minimal
management effort or service provider interaction.- NIST
The cloud is IT as a Service. Delivered by IT resources that are
independent of location.- 451 Group
Cloud computing is still an evolving model, hence no common definition is available. Although
research and analysts have published their own verdict, they are yet to be standardized. Lets see
what analysts say about cloud computing.
According to 451 Group says: The cloud is IT as a Service, delivered by IT resources that are
independent of location.
Gartner says: Cloud computing is a style of computing where massively scalable IT-related
capabilities are provided as a service across the internet to multiple external customers.
Forrester defines cloud computing as: A pool of abstracted, highly scalable, and managed
infrastructure capable of hosting end-customer applications and billed by consumption.
According to NIST: Cloud is a model for enabling convenient, on-demand network access to ashared pool of configurable computing resources such as networks, servers, storage, and
applications, that can be rapidly provisioned and released with minimal management effort or
service provider interaction.
8/12/2019 55256765 Cloud Computing Foundation
7/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 7
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 7
Cloud Offering Examples - 1
Salesforce.com
EMC Mozy, AtmosGoogle App Engine
Amazon EC2, S3
Pay-As-You-Go
Securedonlineba
ckupservice
On-deman
dcomputin
gresource
s
Access
on-dema
nd
Leveragela
testtechnol
ogyTrialonw
idevariet
yof
platform
/infrastruc
ture
I want secured backup of my f iles, so
that I can retrieve from anywhere,
anytime
My organization needs to g row, but
cant spend much to buy new
servers, storage
My organization
want to test a
software, before
investment into it I need a word
processing
application for brief
period to prepare my
documents
My organization
handles critical
customer data,
but secured
storage
infrastructure
is lacking
From business perspective, periodic upgrades of computing resources has become a necessity to
deliver better and faster in the market. You might need to rapidly expand your business, which
may enforce to multiply your organizations capability in terms of adding new servers, storage
devices, network bandwidth etc. Critical business data must be protected and should be available
to the intended user, which requires data security, and disaster recovery infrastructure. As your
capital expenditure rises, the risk associated with the investment too increases. For small and
medium size businesses, this may be a big challenge, which eventually restricts their business to
grow. As an individual, it may not be sensible or affordable every time to purchase new
applications if you need them only for a brief period.
8/12/2019 55256765 Cloud Computing Foundation
8/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 8
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 8
Cloud Offering Examples - 2
Salesforce.com
EMC Mozy, AtmosGoogle App Engine
Amazon EC2, S3
I want secured backup of my files, so
that I can retrieve from anywhere,
anytime
My organization needs to g row, but
cant spend much to buy new
servers, storage
My organization
want to test a
software, before
investment into it I need a word
processing
application for brief
period to prepare my
documents
Pay-As-You-Go
My organization
handles critical
customer data,
but secured
storage
infrastructure
is lacking
Securedonlineba
ckupservice
On-deman
dcomputin
gresource
s
Access
on-dema
nd
Leveragela
testtechnol
ogyTrialonw
idevariet
yof
platform
/infrastruc
ture
On the contrary to purchase new resources, cloud services are hired based on pay-per-use
without involving any capital expenditures. Cloud service providers offer on-demand network
access to configurable computing resources such as networks, servers, storage, and applications.
You can scale up or down your demand of computing resources with minimal management
effort or service provider interaction. Cloud service providers leverage cloud computing
technology to pool and virtualize distributed computing resources, and provide location
independent virtual image of aggregated resources, such as a virtual server with user specified
hardware configuration, operating system, and applications. At any point in time you may
discontinue a service or may switch to another cloud service. You can leverage cloud service
providers expertise to store, protect, backup, and replicate data empowered by most advanced
technology, which otherwise would cost you more.
8/12/2019 55256765 Cloud Computing Foundation
9/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 9
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 9
Background of Cloud Computing - 1
Part of grid computing + most of utility computing + more
New paradigm of computing
Cloud Computing
Grid Computing Parallel computing
Clustered node, kept ready to handle distributed workload
Small workload causes unutilized/under-utilized node
Utility Computing Virtualization improves resource utilization and reduces
CAPEX, OPEX
Offer metered service
Historically, cloud computing has evolved through grid and then utility computing.
In grid computing environment, the workload is distributed or transferred to nodes with neededcomputing resources. Usually a chain of nodes, such as servers, are networked to form the grid.
These nodes are typically clustered and are kept ready to handle the distributed workload. Grid
computing enables parallel computing, although its utility is best for large workloads.
8/12/2019 55256765 Cloud Computing Foundation
10/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 10
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 10
Background of Cloud Computing - 2
Part of grid computing + most of utility computing + more
New paradigm of computing
Cloud Computing
Grid Computing Parallel computing
Clustered node, kept ready to handle distributed workload
Small workload causes unutilized/under-utilized node
Utility Computing Virtualization improves resource utilization and reduces
CAPEX, OPEX
Offer metered service
The emergence of the virtualization technology at storage, servers, and network allows
organizations to offer on-demand, metered service similar to public utility, hence the term utility
computing.
The main benefit of utility computing is capital and operational cost savings. Most datacenters
have underutilized servers, storage networks, and storage, due to over provisioning to handle
peak workload, sudden spike, and projected growth. Utility computing introduces pay only for
what you use models, allowing organizations to hire computing resources when required.
8/12/2019 55256765 Cloud Computing Foundation
11/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 11
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 11
Background of Cloud Computing - 3
Part of grid computing + most of utility computing + more
New paradigm of computing
Cloud Computing
Grid Computing Parallel computing
Clustered node, kept ready to handle distributed workload
Small workload causes unutilized/under-utilized node
Utility Computing Virtualization improves resource utilization and reduces
CAPEX, OPEX
Offer metered service
Cloud computing has borrowed many concepts of grid computing; however, the computing
resources can be dynamically allocated or upgraded, even at a more granular level based on
workload demand. Additionally, cloud computing can be developed with non-grid
environments, such as a three-tier web architecture running traditional or Web 2.0 applications.
The backbone of cloud computing is utility computing, however, it offers a wider picture. It can
be applied internal to an organization to build its own cloud infrastructure, in addition to utility
services. Cloud provides the opportunity of unlimited scalability, significant cost savings,
internet based access, workload balancing, dynamic and fine granular provisioning, and self
service requesting. It is an emerging technology, but already considered as another generation of
computing, after mainframe, personal computer, client-server computing, and the web.
8/12/2019 55256765 Cloud Computing Foundation
12/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 12
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 12
Cloud Services
Cloud computing enables cloud services
Characteristics:On-Demand / Self Service
Accessed via the internet
Minimal/no IT skills to implement cloud services
Underlying technology is transparent to the user
Web browser or web service API based access
Dedicated or shared resources
Rapid ElasticityMeasured service
Cloud service offerings classified into three models
SaaS, PaaS, IaaS
Cloud computing enables cloud services such as backup, archive, web e-mail, and word
processing for individual and business. Some of the characteristics of cloud services are listed
on the slide.
A cloud service user can unilaterally provision computing resources when needed, with no
human interaction with a service provider. Cloud services are typically accessed via the Internet.
Cloud service providers off-load all the computational job from cloud users. Cloud users
leverage ready to use services and may need to select service parameters to customize the
services. Cloud implementation details are transparent to the consumers who receive completely
automated response from cloud computing infrastructure. User can access cloud services using a
web browser or web service APIs. A cloud may be dedicated for use to an organization, or
multiple organizations can share common cloud computing resources. Cloud computing allows a
user to scale up, down, out, or back the demand for IT resources rapidly and easily. This elastic
resource provisioning capability often provides a sense of unlimited scalability to the cloud
service user. Cloud computing enables a metered service for billing and chargeback for the
cloud resource accessed. The metered services continuously monitors resource usage such as
CPU time, bandwidth, storage capacity and reports to the cloud service user providing
transparency for both provider and user.
Cloud service offerings can be classified into three models: Software as a Service or SaaS,
Platform as a Service or PaaS, and Infrastructure as a Service or IaaS. We will discuss these
models in subsequent slides.
8/12/2019 55256765 Cloud Computing Foundation
13/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 13
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 13
Software-as-a-Service ModelTenant 1
Hired Resources
Tenant 2
Application
Web/App Server
Middleware
Databases
OS
Storage
Networking
You pay for the application
Examples:Salesforce.comEMC Mozy (Backup as the service)Google Apps
This slide looks at the Software as a Service (SaaS) model. The capability provided to the
consumer is to use the providers applications running on a cloud infrastructure. The
applications are accessible from various client devices through a thin client interface such as a
web browser. The consumer does not manage or control the underlying cloud infrastructure
including network, servers, operating systems, storage, or even individual application
capabilities, with the possible exception of limited user-specific application configuration
settings.
[Source: National Institute of Standards and Technology (NIST), Information Technology
Laboratory ]
To access software as a service, cloud users pay only for the application they use. A few leading
examples of software as a service are Salesforce.com, which provides access to the variousbusiness software to its subscribers, EMC Mozy, which offers secured online backup service to
its clients, and Google Apps, offering email and word processing services.
8/12/2019 55256765 Cloud Computing Foundation
14/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 14
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 14
Platform-as-a-Service ModelTenant 1
Hired Resources
Tenant 2
Application
Web/App Server
Middleware
Databases
OS
Storage
Networking
Application
You pay for the platformsoftware componentsWeb application environmentDatabasesOS instancesMiddleware
Your applications are built ontop
Examples:Google App EngineMicrosoft AzureForce.com Platform
This slide describes the Platform as a Service (PaaS) model. The capability provided to the
consumer is to deploy consumer-created or acquired applications (created using programming
languages and tools supported by the provider) on the cloud infrastructure. The consumer does
not manage or control the underlying cloud infrastructure, including network, servers, operating
systems, or storage, but has control over the deployed applications and possibly application
hosting environment configurations.
[Source: National Institute of Standards and Technology (NIST), Information Technology
Laboratory ]
For platform as a service, users pay only for the platform software components such as web
application environment, databases, OS instances, and middleware, on top of which applications
are launched. Google App Engine, Microsoft Azure, and Force.com are foremost examples ofplatform as a service.
8/12/2019 55256765 Cloud Computing Foundation
15/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 15
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 15
Infrastructure-as-a-Service ModelTenant 1 Tenant 2
Application
Storage
Networking
Application
Web/AppServer
Web/AppServer
Middleware MiddlewareMiddleware
Databases Databases
OS OS
Hired Resources
You pay for the infrastructurecomponentsStorageNetwork Connectivity
Your OS image and applicationson top
Examples:Amazon EC2EMC Atmos
This slide illustrates the Infrastructure as a Service (IaaS) model. The capability provided to the
consumer is to provision processing, storage, networks, and other fundamental computing
resources where the consumer is able to deploy and run arbitrary software, which can include
operating systems and applications. The consumer does not manage or control the underlying
cloud infrastructure but has control over operating systems, deployed applications, and possibly
limited control of select networking components for example host firewalls.
[Source: National Institute of Standards and Technology (NIST), Information Technology
Laboratory ]
To use infrastructure as a service, cloud service user only pays for the infrastructure components,
which include storage and networking resources. Amazon EC2 is an example of infrastructure
as a service. It allows user to build virtual machines and install their software on top of it. EMCAtmos is the first multi-petabyte information management offering, designed to help customers
automatically manage and optimize the delivery of rich, unstructured information across large-
scale global cloud storage environments.
8/12/2019 55256765 Cloud Computing Foundation
16/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 16
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 16
Types of Cloud Computing - 1
Private Cloud
Public Cloud
Cloud computing can be classified into three deployment models, private, public, and hybrid,
which provide a basis for how cloud infrastructures are constructed and consumed.
In Private Cloud, infrastructure is deployed and operated exclusively for an organization or
enterprise. It may be managed by the organization or by an independent third party and may
exist on-premise or off-premise at a hosting facility.
Public Cloud infrastructure is available to public or many industry groups or customers. It is
owned by the organizations promoting and selling cloud services. This can also be thought of as
an on-demand and a pay-as-you-go environment where there are no on-site infrastructure or
management requirements; however, the environment is no longer within the customers
perimeter.
[Source: NIST]
Popular examples of public clouds include Amazons Elastic Compute Cloud (EC2), Google
Apps, and Salesforce.com.
8/12/2019 55256765 Cloud Computing Foundation
17/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 17
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 17
Types of Cloud Computing - 2
Hybrid Cloud
+
Hybrid Cloud is a composition of two or more clouds, private and public. Each cloud retains its
unique entities. Clouds may be federated or bound together by technology, enabling data and
application portability. Hybrid cloud is prevalent for several reasons. For example, many
organizations have existing private cloud infrastructure and may need to extend their capability,
or often the benefits of combining both private and public clouds may be a more efficient model
to handle an unexpected surge in the application workload.
[Source: NIST]
Most large organization CIOs are holding off on putting their computing requirements on public
cloud, but leading to develop private cloud. In this case, critical customer data can be restricted
within an organizations private cloud; however management and monitoring applications can
run on public cloud. Customer gets updates from the public cloud and can send queries. Both theclouds remain partitioned from each other, however, together they form a hybrid cloud.
8/12/2019 55256765 Cloud Computing Foundation
18/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 18
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 18
Cloud Benefits - 1
High availability
Reduced risk
Flexible scaling
No infrastructure management complexity
Increased capability
Improved performance
Lower cost
Let us list and discuss various cloud benefits:
Increased capability: Consumers can leverage cloud service providers expertise forinfrastructure management, backup, disaster recovery, load sharing, data compression, de-
duplication, encryption, and security services.
Improved performance: Performance can be scaled up by distributing CPU intensive tasks to
multiple offsite locations. For example, a sudden surge in the workload during peak season can
be handled by dynamically allocating additional computing resources within the cloud for the
workload.
8/12/2019 55256765 Cloud Computing Foundation
19/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 19
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 19
Cloud Benefits - 2
High availability
Reduced risk
Flexible scaling
No infrastructure management complexity
Increased capability
Improved performance
Lower cost
Lower cost: Cloud services can be hired, therefore, cloud consumers can save money as there is
no capital expenditure or CAPEX required. Customers leverage cloud service providers
infrastructure, hence there is no ongoing expenses for running datacenter such as cost of power,
HVAC system, additionally real estate cost can be minimized.
Cloud computing allows companies to only pay for the computing resources they access on a
metered basis. Organizations can curb their operational expenditure, or OPEX, by only using
cloud resources when it is required and terminate the service after their job is done. Cloud
consumers can further reduce their cost by leveraging automated tiered services offered by the
cloud service providers. For example, if your company is using Infrastructure as a Service and
your application workload is not demanding, your application and operating system can be
redirected from using tier 1 to tier 2 storage.
Cloud resources can be shared among multiple consumers or tenants, although mechanisms
built-in the cloud prevents them to know about each others existence. Sharing of resources
further lowers the rent of cloud services.
When running your applications in the cloud, it means you are paying for their staff to service
your business needs. That allows you to redeploy your existing staff to other projects
specifically tied to your business rather than providing a utility service such as e-mail. This also
reduces the time to market.
8/12/2019 55256765 Cloud Computing Foundation
20/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 20
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 20
Cloud Benefits - 3
High availability
Reduced risk
Flexible scaling
No infrastructure management complexity
Increased capability
Improved performance
Lower cost
High availability: Cloud computing has the ability to ensure application availability withvarying levels depending on customer policy and priority of the application. Redundant server,
network resources, and storage equipment along with clustered software enables fault tolerance.These techniques encompasses multiple datacenters in different geographic region havingidentical resource configuration and application instances, which prevents data unavailabilitydue to regional failures. Clustered resources are synchronized and user data is replicated so thatcloud service users can be non-disruptively moved to standby resources. Only a virtual view ofdistributed computing resources are provided to the customers, virtual to physical resourcemapping remains hidden to the consumer. Therefore, this movement is transparent to the cloudservice users.
Reduced risk: Another fundamental advantage of cloud is there is no risk of investing largeamount or signing long term agreement. If the project is not viable, you stop paying for it and ifneeded, change the cloud services immediately. Cloud is ideal for test and experimenting withnew software.
Flexible scaling: Cloud can be easily and instantly scaled up and down based on demand. Itappears to the consumers that cloud resources are expandable to infinite limit. Cloud allows selfservice requesting. Cloud service users can independently and automatically scale theircomputing capabilities without any human interaction with cloud service providers.
No infrastructure management complexity: Because cloud resources can be hired, thiseliminates monitoring, provisioning, backup, replication, and maintenance issues.
8/12/2019 55256765 Cloud Computing Foundation
21/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 21
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 21
Module Summary
Key points covered in this module:
Cloud computing definition and offerings Evolution of cloud computing
Cloud services
SaaS, PaaS, and Iaas model
Types of cloud computing
Private, public and hybrid cloud
Benefits of cloud computing
Appl ication
Web/App Server
Middleware
Databases
OS
Storage
These are the key points covered in this module. Please take a moment to review them.
8/12/2019 55256765 Cloud Computing Foundation
22/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 22
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 22
Module 2: Cloud Infrastructure
Upon completion of this module, you will be able to:
Detail various components of cloud computing Describe cloud infrastructure layers
Explain the series of cloud computing processes toenable a service
Describe cloud storage infrastructure
Describe the steps for storing file to cloud storage
The objectives for this module are shown here. Please take a moment to read them.
8/12/2019 55256765 Cloud Computing Foundation
23/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 23
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 23
Cloud Components
Client DevicesUser Access Interface
Back-end
Front-end
Cloud Services(SaaS,PaaS,laaS)
(cloud OS, middleware, securitytool, management tools, loadbalancing tool, metering tool,automation tool)
Cloud Hardware Cloud Software
(server, storage, interconnectivitydevices)
Cloud computing architecture is the unification of modular components to provide cloud
services. These components can be broadly classified as front-end, and back-end. The front-end
includes users computing devices which may be wireless or wired to a LAN and user interfaces
to access cloud offerings. Back-end consists of underlying cloud computing infrastructure
responsible for providing cloud services. A network, typically internet, must exist to connect
front-end and back-end components.
User interface can be web services APIs, specified by cloud providers or web based program,
such as e-mail application, which runs on a standard web browser. Back-end components are
cloud software, hardware, and services.
Cloud hardware includes servers, data storage systems, and interconnectivity devices.
Cloud software encompasses cloud operating system, and middleware. Cloud operating system
enables expansion of the server, storage, and network virtualization beyond physical datacenter
by pooling resources from multiple sites. The resources are aggregated and federated together so
that applications can act on the single pool of resources. Middleware such as messaging tools
facilitates communication among network connected cloud resources. Other software are,
security tools, management tools such as monitoring, provisioning, and disaster recovery tools,
load balancing tool, metering tool, and automation tools which enable self service requesting.
On top of cloud hardware, and software, cloud services such as SaaS, PaaS, and IaaS are
enabled, cataloged, and published.
8/12/2019 55256765 Cloud Computing Foundation
24/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 24
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 24
Cloud Infrastructure Layers - 1
ServicesCatalog of available services
Options, parameters
Service Management
User request management
Provisioning, performance tuningMetering
DR/ backup
License managementInformation security management
Aggregation LayerCloud OS, mobility software, middleware (Virtual Image
deployment, workload management, integrated security,high availability), interconnecting devices
Virtualization Layer Virtualization Layer
Servers Storage Netw orkServers Storage Network
This slide looks at the layered appearance of cloud infrastructure.
The bottom layer consists of physical resources, including servers, storage systems, and networkcomponents, which are physical elements of a datacenter. The virtualization layer is used to
create virtual resources and map virtual resources to physical elements of a datacenter. Server,
storage, and network virtualization technologies take pivotal roles to create the virtualization
layer. An organization may have islands of such virtualized resources scattered across the
globe.
8/12/2019 55256765 Cloud Computing Foundation
25/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 25
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 25
Cloud Infrastructure Layers - 2
ServicesCatalog of available services
Options, parameters
Service Management
User request management
Provisioning, performance tuningMetering
DR/ backup
License managementInformation security management
Aggregation LayerCloud OS, mobility software, middleware (Virtual Image
deployment, workload management, integrated security,high availability), interconnecting devices
Virtualization Layer Virtualization Layer
Servers Storage Netw orkServers Storage Network
The aggregation layer extends the virtualization concept beyond physical datacenter by
aggregating virtualized and physical computing resources located at various offsite locations.
Aggregation layer provides a virtual view of resources, as one big resource, or as many little
ones. Aggregated resources form the basis of cloud which is managed centrally as a single pool
of computing resources. All the network communication between distributed resources are
optimized to enable seamless workload distribution and data mobility among the sites. The
mobility and distribution is transparent to the cloud users.
Cloud operating system is responsible for aggregating distributed resources and provides virtual
view of these resources. Mobility tools, and middleware software have key roles in workload
distribution, virtual image to physical resource allocation, integrated security, and failover.
8/12/2019 55256765 Cloud Computing Foundation
26/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 26
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 26
Cloud Infrastructure Layers - 3
ServicesCatalog of available services
Options, parameters
Service Management
User request management
Provisioning, performance tuningMetering
DR/ backup
License managementInformation security management
Aggregation LayerCloud OS, mobility software, middleware (Virtual Image
deployment, workload management, integrated security,high availability), interconnecting devices
Virtualization Layer Virtualization Layer
Servers Storage Netw orkServers Storage Network
The service management layer runs service management software, which automates the user
request fulfillment process by sending instructions to the aggregation layer. This software
enables self-service provisioning and performance tuning, metering such as bandwidth and
storage usage, business continuity policies such as number of replicas for disaster recovery, and
license management. In addition to that, the software has either in-built security mechanism or
the capability to interact with external security services to implement authentication, access
control, and auditing features.
On top of the stack is the services layer, which publishes catalogs of available cloud services for
cloud users. When a service is selected, this layer may provide a list options and parameters
associated to the service. Cloud users may select appropriate options and necessary parameters
to customize a service.
8/12/2019 55256765 Cloud Computing Foundation
27/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 27
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 27
How Cloud Works - 1Cloud Service Provider
User request (User ID + service
Service Delivery
User interface
Catalog of published services
Options and settings
Cloud Service Userparameters)
Maintain
Cloud
Services
Create
Publish
The model of delivering cloud services can be segregated into two entities: Cloud service user
and cloud service provider. Cloud service providers create, publish, and maintain cloud services.
Cloud service users can be an administrator of the cloud service consumers organization who
requests a service for employees, or an individual. Users can view a catalog of published
services and select necessary options using web browser or web service APIs. When a user
selects or requests a service, user identity information plus selected service parameters are
transferred to the service provider.
8/12/2019 55256765 Cloud Computing Foundation
28/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 28
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 28
How Cloud Works - 2Cloud Service Provider
Validation of user identity
User request management tools processes userrequest and initiate user request fulfillment
operation
User request management process sends instructionsto the aggregation layer
Aggregation layer creates virtual image by aggregating necessaryphysical resources or uses preconfigured template
Launch user specified application and platform software on virtualimage
(provisioning, performance tuning, monitoring, metering,policy, security)
User request (User ID + service
Service Delivery
User interface
Catalog of published services
Options and settings
Cloud Service Userparameters)
Cloud service providers validate the user identity as part of security services they offer. After
validation, user request management tools process user request and initiate user request
fulfillment operations. A user request management process sends instructions to the aggregation
layer to provision cloud resources for creating virtual image. The service parameters are
implemented while creating a virtual image from distributed physical and virtual resources, and
a user ID is used to set policy for the requested service. A policy can be associated with business
continuity, archiving, resource location, etc. For example, a storage service may be allied with a
policy to create three synchronous replicas and one asynchronous replica at specific locations or
to set a retention period during which data cannot be modified. Otherwise, preconfigured image
templates, maintained by the cloud service providers, are used to assign virtual images.
In addition to this, cloud service providers offer monitoring services so that users can observe
the performance of virtual image they created and may change the settings, if required. Cloud
providers associate metering service to enable pay-as-you-go feature.
Once the virtual image is ready, user specified applications and platform software may be
launched on top of the virtual image. Now the user can leverage the specified service.
Note that, at any time a user can update or terminate the service, depending upon their role and
privilege. Termination of service destroys the image and releases cloud resources.
8/12/2019 55256765 Cloud Computing Foundation
29/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 29
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 29
Cloud Storage Infrastructure - 1
NAS, iSCSI, SAN
Isolated Virtualized Storage Devices
Aggregation or pooling of Virtual/physical storage devices
Distributed Physical Storage Devices
Cloud storage services are created on top of cloud storage infrastructure, which mostly consists
of elements found in enterprise datacenter. However, these elements are integrated and
provisioned in such that their combined capability can be raised dynamically according to the
need of cloud users.
Aggregation technology enables pooling of virtual or physical storage devices scattered at
various geographic locations using NAS, iSCSI, and SAN protocols. This pool of storage
resources are managed as a single entity which simplifies and facilitates the placement and
tracking of application data among physical storage devices.
8/12/2019 55256765 Cloud Computing Foundation
30/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 30
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 30
Cloud Storage Infrastructure - 2
NAS, iSCSI, SAN
Isolated Virtualized Storage Devices
Aggregation or pooling of Virtual/physical storage devices
Cloud storage functionalities(High scalability and performance, virtual provisioning, securityData protection, de-duplication, encryption, compression, tiering,
Load balancing, replication, backup, archive, chargeback)
Distributed Physical Storage Devices
Cloud storage service providers typically set up storage infrastructures that can handle large
workloads to ensure sudden demand of storage resources, performance, and availability.
Therefore cloud storage devices must have functionalities like high scalability, high
performance, virtual and automated provisioning, security control and data protection.
Enterprise datacenters also leverage these functionalities; however, they are deployed at mass
scale so that cloud users feels that the storage infrastructure is stretchable to infinite limit.
Other functionalities are de-duplication, encryption, compression, tiered storage service, load
balancing, replication, backup, archiving, and chargeback.
8/12/2019 55256765 Cloud Computing Foundation
31/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 31
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 31
Cloud Storage Infrastructure - 3
NAS, iSCSI, SAN
Isolated Virtualized Storage Devices
Aggregation or pooling of Virtual/physical storage devices
Cloud storage functionalities(High scalability and performance, virtual provisioning, securityData protection, de-duplication, encryption, compression, tiering,
Load balancing, replication, backup, archive, chargeback)
User request management(Policy management, resource management)
Distributed Physical Storage Devices
User request management process typically runs on a storage service node and receives user
request for creating, updating, and discarding service, as well as for storing data to the cloud
storage. It invokes user request fulfillment processes for policy management and resource
management. These processes pass instructions to the aggregation layer to create suitable virtual
storage devices. Applying a storage services policy for a specific user or application data is a
two step operation:
Step 1: Categorization of the data based on service metadata and user ID
Step 2: Define functionalities for storing data of each category
Resource management process is responsible for optimized data placement, clustering, and
tracking of data locations. Optimization enables faster storage and retrieval of user data. For
example, striping data across all cloud storage drives containing an application data to improve
I/O performance, or data may be read from the same location as the client request or data may
be read from the replica that is the fewest network hops away.
8/12/2019 55256765 Cloud Computing Foundation
32/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 32
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 32
Cloud Storage Infrastructure - 4
Cloud user access interface
Cloud storage services interface (NFS/CIFS, SOAP,REST)
NAS, iSCSI, SAN
Isolated Virtualized Storage Devices
Aggregation or pooling of Virtual/physical storage devices
Application, and platform software/middleware
Exported cloud optimized storage devices (FC, iSCSI)
Cloud storage functionalities(High scalability and performance, virtual provisioning, security
User request management(Policy management, resource management)
Distributed Physical Storage Devices
Data protection, de-duplication, encryption, compression, tiering,
Load balancing, replication, backup, archive, chargeback)
Cloud storage services interface publishes services offered by the cloud storage provider, allow
user or application to request a service, and export cloud optimized storage devices. Data
coming from user or application are treated as object and a unique object ID is used for object
reference. Applications can leverage exported cloud storage devices when storage service
request is fulfilled. User or application access to the storage services may require NFS or CIFS
connections and web object interface protocols such as HTTPs, SOAP, and REST.
8/12/2019 55256765 Cloud Computing Foundation
33/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 33
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 33
Storing a File to Cloud Storage - 1
Store and retrieve user data as object
Irrespective of file level, block level, or streaming bits
Object ID is used for reference
Object metadata is used to enforce policies
Object ID is returned to users application
Data retrieved using only object ID, end-to-end
Database maintained to locate physical storage
resources for each object ID
Cloud storage infrastructure stores and retrieves all incoming user data as object, regardless of
file level, block level, or streaming bits of information. For example, an object can be a word
document, pdf file, or a video file; however, they are treated as object stored at the cloud virtual
storage and identified by an object ID. Object descriptors or metadata such as identity of
application or user who has created data, content type of the object, date of creation are also
transferred along with the user data which are used to enforce policies and functionalities for the
object. This object ID is returned to the users applications so that a file can be retrieved using
only object ID end-to-end. Cloud resource management process maintains database for physical
storage resources for each object ID, which speeds up storing, update, and retrieval of user data.
8/12/2019 55256765 Cloud Computing Foundation
34/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 34
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 34
UserRequest
Management Node
Virtual image of storage
Physical Storage location 1
Physical Storage location 2
Physical Storage location 3
Cloud Storage
Services Interface
Policy
management
Resource
management
Appl icationWebService
API
OS
1
Thin Client
2
2
3
4 4
5
6
6
Storing a File to Cloud Storage - 2
1. Thin client passes file to application
2. Application sends the request and the file tocloud storage using web service protocols suchas SOAP/REST
3. Cloud storage service interface passes the fileand metadata to the user request managementnode
4. User request management process invokespolicy management process and resourcemanagement process to define policy anddetermine layout
5. File is stored as object to virtual image which ismapped to distributed physical resources
6. Object ID is returned to the application throughcloud storage service interface
Lets have a look at the operational steps of storing a file to the cloud storage. Consider that a
user, having a thin device, sends a file to the application server which leverages cloud storage.
Application passes the file to the cloud storage service interface using web service protocols
such as SOAP, or REST. Cloud storage service interface passes the file and the file metadata to
the user request management node. This node runs user request management process which
invokes policy management and resource management processes. Policy management process
analyze the file metadata and define a strategy for storing the file. Based on the strategy,
resource management process determines the layout for storing the file. It communicates with
the aggregation layer technology to create virtual image from the physical storage devices which
may be located at offsite locations depending on the layout determined before. An object ID is
generated for the file and passed to the user request management node, along with the layout
information. User request management node stores the file as objects. Resource managementprocess tracks the physical storage devices for each object ID.
After storing the object, the object ID is returned to the application via cloud storage services
interface.
8/12/2019 55256765 Cloud Computing Foundation
35/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 35
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 35
Module Summary
Key points covered in this module:
Components of cloud computingFront-end and back-end components
Cloud infrastructure layers
Cloud service request fulfillment procedure
Cloud storage infrastructure
Steps for storing file to cloud storage
These are the key points covered in this module. Please take a moment to review them.
8/12/2019 55256765 Cloud Computing Foundation
36/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 36
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 36
Module 3: Migration To Cloud
Upon completion of this module, you will be able to:
Understand cloud migration consideration Describe process and steps to cloud move
Identify right cloud model for your organization
Discuss private cloud as a preferred choice fororganizations
Understand factors for choosing right application for cloudmove
The objectives for this module are shown here. Please take a moment to read them.
8/12/2019 55256765 Cloud Computing Foundation
37/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 37
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 37
Are You Ready For The Cloud??
CIOs/IT Managers seeking move to cloud faces severalquestions:
How do I start with the cloud?
Do I need to re-configure my infrastructure?
Does cloud infrastructure support myapplication?
Is the cloud infrastructure capable of
providing required QoS?
How will I address Change Management and integrationconcerns?
Enterprises are not only looking to get a financial advantage with their first cloud move but also
making a significant learning experience to gradually expand their cloud perspective.
Businesses, determining how to make their first move into the cloud always face a question
How do I start with the cloud? since a risk of introducing immature clouds into an established
system.
Most companies are not ready to abandon their existing IT investments to move all of their
business processes fully to the cloud at once. Instead, it is more likely to be a gradual shift in
business processes to the cloud over time, similar by nature to a perpetual proof of concept. The
reason behind this hesitation is the cloud providers are not offering the same levels of security,
controls, and performance assurances that organizations have on-premise. And there is lack of
sufficient regulatory compliances and policies.
8/12/2019 55256765 Cloud Computing Foundation
38/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 38
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 38
Migration To Cloud Considerations - 1
Understand How cloud fits to your requirements
Understand current infrastructure and requirements
Application perspective, network perspective and security perspective
Business processes and policies
Consider Risk Vs Convenience profile
Enterprise
SMB
Startup
Individual
Convenience
Risk
Any organization considering a move to the cloud needs to understand and address various
concerns which can make their perceived benefits short-lived. Studies based on experience of
cloud early adopters suggest that moving to the cloud without proper strategy and process does
not make much sense. The most important concern that needs to be evaluated before making a
move to cloud is How cloud computing fits in the context of organizations overall business
strategy. Sometimes a cloud may look great from an application perspective, but may be a
challenge for network administrator in a real time environment, or security may say no to have
data outside of the firewall.
Risk versus convenience is a key consideration for deciding cloud migration strategy. Cloud
benefits are well established, but data may reside outside the organizations perimeter which
involves risk. A balance must be evaluated to determine how much risk an individual or
organization may handle for the sake of convenience. This proportion varies among cloud
consumers, based on they may be segmented into individual, business startup, small and
medium business, and enterprise. Typically, individuals and startup businesses are ready to take
high risk to get most of the convenience offered by a cloud. Compared to that, SMBs and
enterprises are more sensitive to risk and are unlikely to move their tier 1 applications to a
cloud.
8/12/2019 55256765 Cloud Computing Foundation
39/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 39
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 39
Migration To Cloud Considerations - 2
How to integrate with existing IT system
To ensure desired performance, availability and security
Identify best fit cloud model for your organization
Private or public or hybrid
Plan and strategize your move
Understand impact, risk and benefits
Understand billing model
Another concern is How to integrate cloud computing into existing IT systems and applications
to ensure performance, availability and security. According to analysis, most CIOs and IT
executives cite security as their primary concern to cloud computing. Integrated cloud
computing involves moving sensitive data between the cloud and in-house networks, and effects
the data security.
A decision to move to cloud should be based on the understanding of which cloud computing
model will be most suitable for the organization. We will discuss and identify the best fit cloud
model for different cloud service user in the next slide.
While designing a cloud strategy, organizations need to identify integration requirements for
each process and system and determine the number of simultaneous requests to be handled.
They also need to ensure availability of information, even if the cloud or in-house source goesdown. In other words, enterprises should not consider cloud as an alternative but as an added
architecture that provides more value from IT resources, while preserving enterprise process,
policies, and security.
8/12/2019 55256765 Cloud Computing Foundation
40/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 40
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 40
What Model Fit for You
Public Cloud
Convenience Outweighs Risk Low Cost or Free Email, eCommerce, Social
Nets, Gaming
Hybrid Cloud
Tier 1 Apps: Private cloud Tier 2-4:
Public cloud for Backup,Archive, testing
Non OLTP Apps
Public Cloud Convenience Outweighs Risk CAPEX VS OPEX Self-Service Back Office, Development, &Production
IndividualIndividual StartupStartup SMBSMB EnterpriseEnterprise
Private and Hybrid Cloud Tier 2-4: Private cloud Hybrid cloud:
Public cloud for Backup,Archive, testing,Websites, portals
Lets understand which cloud computing model will be most suitable for an organization or
individual.
Public cloud is preferred by individuals who want to access e-mail, e-commerce, or gaming
applications, and least bothered about the security or availability risks in cloud for the most part.
Here cost reduction is the primary objective. Public cloud enables the opportunity to access
these applications using a thin device for free or by paying minimum usage charges. People
starting up businesses from small office or home typically opt public cloud. A large investment
to purchase IT resources are not affordable or sensible. Therefore, for obvious reason,
convenience offered by the cloud outweighs risk.
Small and medium sized business have a moderate customer base and any anomaly in customer
data and service levels may impact their business. Hence, they may not be willing or able to putTier 1 applications such as OLTP in the cloud. A hybrid cloud model may fit in this case, which
includes organizations internal IT resources and external public cloud resources. Tier 1
application data should never cross the boundary of private cloud. Public cloud enables cost
savings and faster time to market and is typically used for tier 2, tier 3, and tier 4 applications
such as backup, archive, and testing. Enterprises typically have strong customer hold worldwide
and priority is to maintain critical customer data and service levels with strict enforcement of
security policies. They are highly concerned with the risk and information access control in
cloud. Many organizations may not even virtualize their tier 1 applications. They are financially
capable of building a massive private cloud, however, a hybrid cloud model could be a viableoption.
8/12/2019 55256765 Cloud Computing Foundation
41/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 41
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 41
First Step To Cloud: Virtualization
Optimize existing resources virtualize the data center
Combine resources together and abstract them to create a virtual world
Virtualization of application and infrastructure
Extend the virtualization beyond a data center
Pool all your distributed resources from multiple sites
Virtualized Infrastructure
APP
OSAPP
OS
APP
OS
APP
OS
APP
OSAPP
OS
APP
OSAPP
OS
APP
OSAPP
OS
APP
OS
APP
OS
Data Center Location 1
APP
OSAPPOS
APPOS
APPOS
APPOS
Data Center Location 2
APP
OSAPPOS
APPOS
APPOS
APPOS
In many ways, the cloud computing is an evolution of what is already happening in data centers:
virtualization, automation and dynamic infrastructure provisioning, all aimed at creating real-
time infrastructures for flexible and dynamic service delivery.
Virtualization is considered to be the first step to cloud computing, With virtualization as an
underpinning, not only do enterprises get the benefit of increased asset utilization, but also take
the first step toward cloud by defining their applications, independent from their physical
infrastructure. With virtualizing and aggregating computing resources into a single pool, you
have the opportunity to operate more efficiently and also operate more flexibly and reliably.
You can start using this shared infrastructure for doing test and development or for doing better
disaster recovery, for example two data centers that act as failover for one another.
Virtualization also provides a level-up in managing your IT by helping you to get away from
issues of underlying infrastructure. With virtualization, you can also automate a lot of the
general management tasks, extricating IT from the business of repetitive management
procedures, and at the same time enabling your end users to get what they need very quickly.
8/12/2019 55256765 Cloud Computing Foundation
42/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 42
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 42
Private Cloud As a Preferred Option
Most large organizations are experimenting first with private clouds
Cloudification of pooled & virtualized internal computing resources involves
Centralized service management, service creation, automation Self service, auto provisioning, metering, load balancing, security, tiering
Cloud Operating System
APP
OSAPP
OS
APP
OS
APP
OS
APP
OSAPP
OS
APP
OSAPP
OS
APP
OSAPP
OS
APP
OS
APP
OS
APP
OSAPP
OS
APP
OS
APP
OS
Data Center Location 1 Data Center Location 2 Data Center Location 3
After aggregating and virtualizing an organizations IT resources, the next step is to enforce
centralized service management, service creation, automation, and associate processes and
technologies such as self-service, metering, load balancing, business continuity, security,
automated tiering, and de-duplication. This forms a private cloud with internal IT resources as
its base. Based on the demand of a cloud service user, virtual images with required configuration
are created and operating system and applications are launched on top of them. The cloud
operating system and middleware have key roles in consolidation of resources, providing virtual
view of these resources, workload distribution, virtual image to physical resource allocation,
integrated security, and failover.
8/12/2019 55256765 Cloud Computing Foundation
43/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 43
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 43
Private Cloud Federating with External Cloud
A blend of internal and external cloud resources to present aseamless, managed service delivery to the business
Probably offers the best value to the enterprise
Cloud Operating System
APP
OSAPP
OS
APP
OS
APP
OS
APP
OSAPP
OS
APP
OSAPP
OS
APP
OSAPP
OS
APP
OS
APP
OS
APP
OSAPP
OS
APP
OS
APP
OS
Private Cloud
Cloud
External
Internal Cloud
Data Center Location 1 Data Center Location 2
Finally, once your private internal cloud has been streamlined, there is an opportunity to
federate with external infrastructures provided by the cloud service providers, blending the two
into a single collection of resources that your organization can use. The key is that they are
never separate resources, they are all one pool. External cloud resources can be seamlessly and
transparently joined when needed. Federation allows rapid elasticity of cloud resources and
provides a sense of unlimited scalability to the cloud service users.
Now let us understand how can we get the best of both worlds the internal cloud and the
external cloud without getting the weakness of either.
8/12/2019 55256765 Cloud Computing Foundation
44/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 44
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 44
Why Private Cloud Get the Best of Both World
Federation
Security
Virtualization
Information
Flexible
Dynamic
On-demand
Efficient
Trusted
Control
Reliable
Secure
External CloudInternal Cloud
What we like about data centers is that theyre rock-solid, trusted, controlled, reliable, and
secure. But they can be expensive.
What everyone finds so appealing about cloud computing is the pay by the drink, elastic nature
of the resources flexible, dynamic, on-demand, and efficient meaning cost effective. We
have a vision that joins the best of both world without the downside of either.
The resources are aggregated and federated together so that applications can act on the
combined resources as a single pool of resources, just like the single pool of resources available
to us today when we use VMware to join servers from multiple racks in a data center.
This forms the private cloud that enables us to get the best of both worlds. The word Private is
used because the use and operation of the cloud resources are completely controlled and only
available to the enterprise. A cloud resource looks and behaves just like the resources you
purchased outright in the past.
8/12/2019 55256765 Cloud Computing Foundation
45/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 45
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 45
CHOICEFederation
with compatibleservice providers
CONTROLUnified
Management
EFFICIENCYVirtualization
and
Consolidation
Path to Private Cloud
Move apps into
virtual
machines
Manage and
Automate the
Infrastructure
Optimize use ofFederated
resources
Deliver IT as a
Service
The three top value points of private cloud are efficiency, control and choice. The private cloud
delivers uncompromised control, in the most efficient manner, while fully preserving customer
choice.
Efficiency Private cloud eliminates unnecessary/unused IT investment, makes better use of
what you have, and minimizes resources needed to manage and maintain IT. Translated into
business terms, efficiency drives both capex and opex savings. It changes the old model of
application and information delivery that is tied to specific systems and architectures, and moves
to a self-managed, dynamically optimized environment. The result is a more efficient delivery
of business services.
Control Private cloud enables the business and IT to determine service levels together and
fully control the quality-of-service for application delivery without compromise. Theautomation, control and insight of the physical world and the virtual world with the focus on
service delivery is what enables IT to shift away from running IT to delivering IT.
Choice The ability to join resources together to aggregate and federate resources means
that IT has new choices, and new options available. Why buy the infrastructure needed to run
the operation at peak load when external cloud resources can be seamlessly and transparently
joined when needed?
8/12/2019 55256765 Cloud Computing Foundation
46/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 46
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 46
What you need to be Cloud Enabled
Deduplication, Compression, Thin Provisioning
Spin-down, Low Power Drives
FAST Automatic Tiering Self-Config, Self-Heal, Self-Manage
Virtual Provisioning
On-Demand /Self Service
ResourcePooling
RapidElasticity
Policy-driven data migration Federation of Virtual Archives
Automatic Failover with SRM
CapabilitiesRequirement
Choice
Efficiency
Efficiency Choice
Control
What i t Delivers
Efficiency (On Demand) Control (Self-service)
Multi-protocol FC, iSCSI, NAS, MPFS
REST, SOAPBroad NetworkAccess
Choice
Efficiency
MeasuredServices
Choice
Control
Resource usage can be monitored, controlled,reported
Billing/metering systems to chargeback for usage
The slide lists the requirements and capabilities to be cloud enabled. Please take a moment to
review them and the values they deliver.
8/12/2019 55256765 Cloud Computing Foundation
47/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 47
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 47
Experiment with Public Cloud
For Non-core business applications
Best option for individuals or startups For beginners
No investment risk and infrastructure expertise required
Web developers, or niche players
A simple, low-cost way to load and go
Experimenting
Software evaluation can be performed in the cloud, before purchase
Faster deployment of new applications
No hardware dependency and integration
Good for seasonal computing needs
Leveraging the Public cloud is often the best option for non-core business applications for
SMBs, or startups and individuals, where they can quickly realize the potential cost saving
benefit without spending in infrastructure. Cloud is also an attractive option for development
and testing of new applications without investing in infrastructure, when you are not sure
whether the project will pass the proof of concept. With the cloud options, software evaluation
can be performed before purchasing licenses or support.
8/12/2019 55256765 Cloud Computing Foundation
48/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 48
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 48
Path to Public Cloud
First step is virtualization of available resourcesApplication and infrastructure virtualization
Second step: Experiment with cloud Prototype application to understand how it work with your
environment
For example cloud backups are a great way to introduce to CC
Measure and document various matrices
Performance, billing, reliability etc.
Gain experience and educate stack holders
Next step: Gradual advancement with cloudBuild business cases to realize capex reduction and better ROI
Establish polices and practices
Deploy production applications
Virtualization of applications and infrastructure provide immediate cost benefit by improving
utilization and reducing management expenditure. Also as a first step, virtualization provides
required flexibility and independence to applications from physical infrastructure and make
them portable to cloud offerings which are based on virtual infrastructure.
Next step is to choose a right application, usually a non-core application to experiment with the
cloud. For example, you can start with your e-mail archiving or data backup in a cloud with
Mozy online. With this step, understand cloud operation and various matrices, such as
performance, billing, security and bottlenecks.
Once you gain sufficient experience with cloud experiment, its time to take full advantage by
deploying more mature applications and processes to scale in the cloud. Establish policies and
process to gradual advancement with production applications, showcase successes to drive thedemand, and ultimately realize the better productivity, improved profitability throughout the IT
organization.
8/12/2019 55256765 Cloud Computing Foundation
49/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 49
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 49
Choosing Right Application to Start - 1
Check compatibility between platform software andapplication
Not all the applications are good for cloud
Depends on cloud infrastructure capability & QoS
Applications may suffer due to insufficient b/w, network latency
Applications with stringent security requirement are unlikely to move
To access PaaS and IaaS, customers may need to migrate their proprietary or any off-the-shelf
application of choice to the cloud. Two disparate considerations may arise while an organization
is planning for migration. The first is cloud computing infrastructure may not support the
application. This may happen due to incompatibility between platform software and application,
or maybe the organization is planning to move a legacy application to the cloud.
The second consideration is related to the justification of moving an application to the cloud.
Not all the applications are good candidates for cloud, although it may depend on the capability
of cloud infrastructure and the quality of service offered by cloud providers. For example,
applications that require real time response may suffer due to insufficient bandwidth, network
latency, and network congestion. Organizations having a stringent backup window should gaze
at the bandwidth and latency factors before moving their backup applications to cloud. For the
same reasons, graphics intensive applications and applications handling large I/O are less likely
to migrate to the cloud. Also, organizations are unlikely to move their business critical
applications with strict security requirement to the cloud.
8/12/2019 55256765 Cloud Computing Foundation
50/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 50
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 50
Choosing Right Application to Start - 2
Candidate Applications:
Non-core applications, to avoid risk, if any
Applications with unpredictable capacity/workload requirements
Spike computing applications
Application development and testing environment
Any stand-alone application
Minimal integration impact
Applications where significant cost benefits can be achieved in ashorter time
Based on the considerations, various applications may be the right candidate to the cloud
computing. Start with the applications which are less important to the core business operations
so the risk associated with them is lower than to core systems, for example a marketing
campaign web-site or any other web based environment which should not be a core business
application. Applications with unpredictable workload or capacity requirements may also fit
well in the cloud computing model as they are candidates of spike computing. Another
environment can be application development and testing in cloud that can offer an
organizations own test and development setup. These applications can provide significant
business benefits, faster project time to market, no capital investment and no skills to expand or
build new setup. Any standalone applications that don't interact much with other applications
can also be a good fit for cloud computing.
8/12/2019 55256765 Cloud Computing Foundation
51/84
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
Cloud Computing Foundations - 51
Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 51
Common Cloud Implementations - 1
Utilize applications running on cloud (offered as SaaS)
Business start ups Testing
Peak computing
Storage related services
Web hosting
This slide discusses some common use cases which reveal the indispensability of migrating to
the cloud. Organizations or individuals can leverage these ideas to accomplish specific tasks by
moving to the cloud, which otherwise cost them more.
Consider a scenario where a single anti-virus program safeguards your organization. However,
no anti-virus software guarantees hundred percent detection and most recent threats may remain
undetected for several days. Also, anti-virus software themselves may be vulnerable to
malicious attack. Cloud providers offer superior protection against viruses by deploying multiple
anti-virus engines developed by different vendors. This new approach is called cloud antivirus
or CloudAV. Suspicious files are screened simultaneously by all the anti-virus programs, hence
detection capability is more than a solitary antivirus software.
Come t