55256765 Cloud Computing Foundation

download 55256765 Cloud Computing Foundation

of 84

Transcript of 55256765 Cloud Computing Foundation

  • 8/12/2019 55256765 Cloud Computing Foundation

    1/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 1

    2009 EMC Corporation. All rights reserved.

    Cloud Computing FoundationsCloud Computing Foundations

    Welcome to Cloud Computing Foundation.

    The AUDIO portion of this course is supplemental to the material and is not a replacement for the student notes accompanying

    this course.EMC recommends downloading the Student Resource Guide from the Supporting Materials tab, and reading the notes in theirentirety.

    Copyright 2009 EMC Corporation. All rights reserved.

    These materials may not be copied without EMC's written consent.

    EMC believes the information in this publication is accurate as of its publication date. The information is subject to changewithout notice.

    THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NOREPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THISPUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESSFOR A PARTICULAR PURPOSE.

    Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.

    EMC , EMC, EMC ControlCenter, AdvantEdge, AlphaStor, ApplicationXtender, Avamar, Captiva, Catalog Solution, Celerra,Centera, CentraStar, ClaimPack, ClaimsEditor, ClaimsEditor, Professional, CLARalert, CLARiiON, ClientPak, CodeLink,Connectrix, Co-StandbyServer, Dantz, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, Document Sciences,Documentum, EmailXaminer, EmailXtender, EmailXtract, enVision, eRoom, Event Explorer, FLARE, FormWare, HighRoad,InputAccel,InputAccel Express, Invista, ISIS, Max Retriever, Navisphere, NetWorker, nLayers, OpenScale, PixTools,Powerlink, PowerPath, Rainfinity, RepliStor, ResourcePak, Retrospect, RSA, RSA Secured, RSA Security, SecurID,SecurWorld, Smarts, SnapShotServer, SnapView/IP, SRDF, Symmetrix, TimeFinder, VisualSAN, VSAM-Assist, WebXtender,where information lives, xPression, xPresso, Xtender, Xtender Solutions; and EMC OnCourse, EMC Proven, EMC Snap, EMCStorage Administrator, Acartus, Access Logix, ArchiveXtender, Authentic Problems, Automated Resource Manager, AutoStart,AutoSwap, AVALONidm, C-Clip, Celerra Replicator, CLARevent, Codebook Correlation Technology, Common InformationModel, CopyCross, CopyPoint, DatabaseXtender, Digital Mailroom, Direct Matrix, EDM, E-Lab, eInput, Enginuity, FarPoint,FirstPass, Fortress, Global File Virtualization, Graphic Visualization, InfoMover, Infoscape, MediaStor, MirrorView, Mozy,MozyEnterprise, MozyHome, MozyPro, NetWin, OnAlert, PowerSnap, QuickScan, RepliCare, SafeLine, SAN Advisor, SANCopy, SAN Manager, SDMS, SnapImage, SnapSure, SnapView, StorageScope, SupportMate, SymmAPI, SymmEnabler,Symmetrix DMX, UltraFlex, UltraPoint, UltraScale, Viewlets, VisualSRM are trademarks of EMC Corporation.

    All other trademarks used herein are the property of their respective owners.

  • 8/12/2019 55256765 Cloud Computing Foundation

    2/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 2

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 2

    Course Objectives

    Upon completion of this course, you will be able to:

    Define and understand cloud computing, Its types,benefits, and services

    Discuss cloud infrastructure and its components

    Evaluate the suitability and processes of migrating tocloud

    Describe challenges and concerns with the cloudcomputing

    Describe EMC positioning and products for cloudcomputing

    Explain the prospects of cloud computing

    The objectives for this course are shown here. Please take a moment to read them.

  • 8/12/2019 55256765 Cloud Computing Foundation

    3/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 3

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 3

    In This Course

    This course contains the following modules:

    1. Introduction to cloud computing2. Cloud Infrastructure

    3. Migration to cloud

    4. Concerns and challenges of cloud

    5. EMCs role and strategies

    6. Future and vision of cloud computing

    Additional Information: EMC Atmos: Whiteboard discussion

    This course contains 6 modules and a whiteboard discussion on EMC Atmos.

    The modules are: Introduction to cloud computing, cloud infrastructure, migration to cloud,cloud concerns and challenges, EMCs role and strategies, and lastly future and vision of cloud

    computing.

  • 8/12/2019 55256765 Cloud Computing Foundation

    4/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 4

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 4

    Module 1: Introduction to Cloud Computing

    Upon completion of this module, you will be able to:

    Define cloud computing and cloud offerings Discuss the background of cloud computing

    Describe common cloud service models

    Software-as-a-Service (SaaS)

    Platform-as-a-Service (PaaS)

    Infrastructure-as-a-Service (Iaas)

    Discuss private, public and hybrid cloud

    Detail the benefits of cloud computing

    The objectives for this module are shown here. Please take a moment to read them.

  • 8/12/2019 55256765 Cloud Computing Foundation

    5/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 5

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 5

    Organization Needs New Computing Resources

    Keep adding servers, storage,connectivity components, HVACsystems

    Increase Data Center (DC) resourceutilization beyond physical limit

    CAPEX

    Extend virtualization beyond enterprise DC On-demand, self service requesting,

    metered

    Can hire computing resources from cloudservice provider

    Pay-as-you-go (chargeback)

    No CAPEX

    IT Today With Cloud

    Department ADepartment B

    Department C

    Backup

    Storage

    iSCSI, NAS, SAN

    VMs VMs

    ComputeApps &

    Department A

    Department B

    Department C

    Archive

    Existing Computing PracticesExpand organizations infrastructure

    New Generation Computing

    Cloud Computing

    Increased dependency on online information leads to on-demand, reliable, secured, and speedy

    access to petabytes of information, which is further growing exponentially. Businesses must

    align themselves to accommodate this astonishing growth much faster than ever, which requires

    multi-fold increase in capacity or capability on the fly. The existing computing practices to meet

    this demand is invest and expand infrastructure, i.e., keep adding servers, storage and other

    necessary elements. The procurement and provisioning of these resources typically take a long

    time, which may impact the service levels demanded by the customer. Many organizations

    deploy server, storage, and network virtualization in a regional basis, or within a datacenter,

    which results in discrete virtual computing environments leveraged by various departments of an

    organization across the globe. Virtualization improves resource utilization, however this

    advantage can be envisaged only for limited period because of its discrete implementation,

    beyond which organizations have to scale up their expenditure to add new resources.

    These long standing pain points can be outdated with the emergence of a new computing

    technology called cloud computing. Cloud computing brings up a new generation of computing

    which enables an organization extend virtualization beyond its enterprise datacenter by

    aggregating IT resources scattered across the globe. Location independent virtual image of

    aggregated resources can be created and assigned dynamically on-demand with a metering

    service to monitor and report resource consumption. Cloud computing allows self service

    requesting empowered by fully automated request fulfillment process in the background.

    Organizations can build their own cloud by pooling and virtualizing distributed resources, as

    well as hiring computing resources from cloud service providers, and pay based on resourceusage such as CPU hours used, amount of data transferred, and gigabytes of data stored.

  • 8/12/2019 55256765 Cloud Computing Foundation

    6/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 6

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 6

    What is Cloud Computing?

    Cloud computing is a style of computing where massively scalable IT-related

    capabilities are provided as a service across the internet to multiple external

    customers. - Gartner

    A pool of abstracted, highly scalable, and managed infrastructure

    capable of hosting end-customer applications and billed by consumption.

    - Forrester Research

    Cloud is a model for enabling convenient, on-demand network access to sharedpool of configurable computing resources (e.g. networks, servers, storage,

    applications) that can be rapidly provisioned & released with minimal

    management effort or service provider interaction.- NIST

    The cloud is IT as a Service. Delivered by IT resources that are

    independent of location.- 451 Group

    Cloud computing is still an evolving model, hence no common definition is available. Although

    research and analysts have published their own verdict, they are yet to be standardized. Lets see

    what analysts say about cloud computing.

    According to 451 Group says: The cloud is IT as a Service, delivered by IT resources that are

    independent of location.

    Gartner says: Cloud computing is a style of computing where massively scalable IT-related

    capabilities are provided as a service across the internet to multiple external customers.

    Forrester defines cloud computing as: A pool of abstracted, highly scalable, and managed

    infrastructure capable of hosting end-customer applications and billed by consumption.

    According to NIST: Cloud is a model for enabling convenient, on-demand network access to ashared pool of configurable computing resources such as networks, servers, storage, and

    applications, that can be rapidly provisioned and released with minimal management effort or

    service provider interaction.

  • 8/12/2019 55256765 Cloud Computing Foundation

    7/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 7

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 7

    Cloud Offering Examples - 1

    Salesforce.com

    EMC Mozy, AtmosGoogle App Engine

    Amazon EC2, S3

    Pay-As-You-Go

    Securedonlineba

    ckupservice

    On-deman

    dcomputin

    gresource

    s

    Access

    on-dema

    nd

    Leveragela

    testtechnol

    ogyTrialonw

    idevariet

    yof

    platform

    /infrastruc

    ture

    I want secured backup of my f iles, so

    that I can retrieve from anywhere,

    anytime

    My organization needs to g row, but

    cant spend much to buy new

    servers, storage

    My organization

    want to test a

    software, before

    investment into it I need a word

    processing

    application for brief

    period to prepare my

    documents

    My organization

    handles critical

    customer data,

    but secured

    storage

    infrastructure

    is lacking

    From business perspective, periodic upgrades of computing resources has become a necessity to

    deliver better and faster in the market. You might need to rapidly expand your business, which

    may enforce to multiply your organizations capability in terms of adding new servers, storage

    devices, network bandwidth etc. Critical business data must be protected and should be available

    to the intended user, which requires data security, and disaster recovery infrastructure. As your

    capital expenditure rises, the risk associated with the investment too increases. For small and

    medium size businesses, this may be a big challenge, which eventually restricts their business to

    grow. As an individual, it may not be sensible or affordable every time to purchase new

    applications if you need them only for a brief period.

  • 8/12/2019 55256765 Cloud Computing Foundation

    8/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 8

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 8

    Cloud Offering Examples - 2

    Salesforce.com

    EMC Mozy, AtmosGoogle App Engine

    Amazon EC2, S3

    I want secured backup of my files, so

    that I can retrieve from anywhere,

    anytime

    My organization needs to g row, but

    cant spend much to buy new

    servers, storage

    My organization

    want to test a

    software, before

    investment into it I need a word

    processing

    application for brief

    period to prepare my

    documents

    Pay-As-You-Go

    My organization

    handles critical

    customer data,

    but secured

    storage

    infrastructure

    is lacking

    Securedonlineba

    ckupservice

    On-deman

    dcomputin

    gresource

    s

    Access

    on-dema

    nd

    Leveragela

    testtechnol

    ogyTrialonw

    idevariet

    yof

    platform

    /infrastruc

    ture

    On the contrary to purchase new resources, cloud services are hired based on pay-per-use

    without involving any capital expenditures. Cloud service providers offer on-demand network

    access to configurable computing resources such as networks, servers, storage, and applications.

    You can scale up or down your demand of computing resources with minimal management

    effort or service provider interaction. Cloud service providers leverage cloud computing

    technology to pool and virtualize distributed computing resources, and provide location

    independent virtual image of aggregated resources, such as a virtual server with user specified

    hardware configuration, operating system, and applications. At any point in time you may

    discontinue a service or may switch to another cloud service. You can leverage cloud service

    providers expertise to store, protect, backup, and replicate data empowered by most advanced

    technology, which otherwise would cost you more.

  • 8/12/2019 55256765 Cloud Computing Foundation

    9/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 9

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 9

    Background of Cloud Computing - 1

    Part of grid computing + most of utility computing + more

    New paradigm of computing

    Cloud Computing

    Grid Computing Parallel computing

    Clustered node, kept ready to handle distributed workload

    Small workload causes unutilized/under-utilized node

    Utility Computing Virtualization improves resource utilization and reduces

    CAPEX, OPEX

    Offer metered service

    Historically, cloud computing has evolved through grid and then utility computing.

    In grid computing environment, the workload is distributed or transferred to nodes with neededcomputing resources. Usually a chain of nodes, such as servers, are networked to form the grid.

    These nodes are typically clustered and are kept ready to handle the distributed workload. Grid

    computing enables parallel computing, although its utility is best for large workloads.

  • 8/12/2019 55256765 Cloud Computing Foundation

    10/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 10

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 10

    Background of Cloud Computing - 2

    Part of grid computing + most of utility computing + more

    New paradigm of computing

    Cloud Computing

    Grid Computing Parallel computing

    Clustered node, kept ready to handle distributed workload

    Small workload causes unutilized/under-utilized node

    Utility Computing Virtualization improves resource utilization and reduces

    CAPEX, OPEX

    Offer metered service

    The emergence of the virtualization technology at storage, servers, and network allows

    organizations to offer on-demand, metered service similar to public utility, hence the term utility

    computing.

    The main benefit of utility computing is capital and operational cost savings. Most datacenters

    have underutilized servers, storage networks, and storage, due to over provisioning to handle

    peak workload, sudden spike, and projected growth. Utility computing introduces pay only for

    what you use models, allowing organizations to hire computing resources when required.

  • 8/12/2019 55256765 Cloud Computing Foundation

    11/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 11

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 11

    Background of Cloud Computing - 3

    Part of grid computing + most of utility computing + more

    New paradigm of computing

    Cloud Computing

    Grid Computing Parallel computing

    Clustered node, kept ready to handle distributed workload

    Small workload causes unutilized/under-utilized node

    Utility Computing Virtualization improves resource utilization and reduces

    CAPEX, OPEX

    Offer metered service

    Cloud computing has borrowed many concepts of grid computing; however, the computing

    resources can be dynamically allocated or upgraded, even at a more granular level based on

    workload demand. Additionally, cloud computing can be developed with non-grid

    environments, such as a three-tier web architecture running traditional or Web 2.0 applications.

    The backbone of cloud computing is utility computing, however, it offers a wider picture. It can

    be applied internal to an organization to build its own cloud infrastructure, in addition to utility

    services. Cloud provides the opportunity of unlimited scalability, significant cost savings,

    internet based access, workload balancing, dynamic and fine granular provisioning, and self

    service requesting. It is an emerging technology, but already considered as another generation of

    computing, after mainframe, personal computer, client-server computing, and the web.

  • 8/12/2019 55256765 Cloud Computing Foundation

    12/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 12

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 12

    Cloud Services

    Cloud computing enables cloud services

    Characteristics:On-Demand / Self Service

    Accessed via the internet

    Minimal/no IT skills to implement cloud services

    Underlying technology is transparent to the user

    Web browser or web service API based access

    Dedicated or shared resources

    Rapid ElasticityMeasured service

    Cloud service offerings classified into three models

    SaaS, PaaS, IaaS

    Cloud computing enables cloud services such as backup, archive, web e-mail, and word

    processing for individual and business. Some of the characteristics of cloud services are listed

    on the slide.

    A cloud service user can unilaterally provision computing resources when needed, with no

    human interaction with a service provider. Cloud services are typically accessed via the Internet.

    Cloud service providers off-load all the computational job from cloud users. Cloud users

    leverage ready to use services and may need to select service parameters to customize the

    services. Cloud implementation details are transparent to the consumers who receive completely

    automated response from cloud computing infrastructure. User can access cloud services using a

    web browser or web service APIs. A cloud may be dedicated for use to an organization, or

    multiple organizations can share common cloud computing resources. Cloud computing allows a

    user to scale up, down, out, or back the demand for IT resources rapidly and easily. This elastic

    resource provisioning capability often provides a sense of unlimited scalability to the cloud

    service user. Cloud computing enables a metered service for billing and chargeback for the

    cloud resource accessed. The metered services continuously monitors resource usage such as

    CPU time, bandwidth, storage capacity and reports to the cloud service user providing

    transparency for both provider and user.

    Cloud service offerings can be classified into three models: Software as a Service or SaaS,

    Platform as a Service or PaaS, and Infrastructure as a Service or IaaS. We will discuss these

    models in subsequent slides.

  • 8/12/2019 55256765 Cloud Computing Foundation

    13/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 13

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 13

    Software-as-a-Service ModelTenant 1

    Hired Resources

    Tenant 2

    Application

    Web/App Server

    Middleware

    Databases

    OS

    Storage

    Networking

    You pay for the application

    Examples:Salesforce.comEMC Mozy (Backup as the service)Google Apps

    This slide looks at the Software as a Service (SaaS) model. The capability provided to the

    consumer is to use the providers applications running on a cloud infrastructure. The

    applications are accessible from various client devices through a thin client interface such as a

    web browser. The consumer does not manage or control the underlying cloud infrastructure

    including network, servers, operating systems, storage, or even individual application

    capabilities, with the possible exception of limited user-specific application configuration

    settings.

    [Source: National Institute of Standards and Technology (NIST), Information Technology

    Laboratory ]

    To access software as a service, cloud users pay only for the application they use. A few leading

    examples of software as a service are Salesforce.com, which provides access to the variousbusiness software to its subscribers, EMC Mozy, which offers secured online backup service to

    its clients, and Google Apps, offering email and word processing services.

  • 8/12/2019 55256765 Cloud Computing Foundation

    14/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 14

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 14

    Platform-as-a-Service ModelTenant 1

    Hired Resources

    Tenant 2

    Application

    Web/App Server

    Middleware

    Databases

    OS

    Storage

    Networking

    Application

    You pay for the platformsoftware componentsWeb application environmentDatabasesOS instancesMiddleware

    Your applications are built ontop

    Examples:Google App EngineMicrosoft AzureForce.com Platform

    This slide describes the Platform as a Service (PaaS) model. The capability provided to the

    consumer is to deploy consumer-created or acquired applications (created using programming

    languages and tools supported by the provider) on the cloud infrastructure. The consumer does

    not manage or control the underlying cloud infrastructure, including network, servers, operating

    systems, or storage, but has control over the deployed applications and possibly application

    hosting environment configurations.

    [Source: National Institute of Standards and Technology (NIST), Information Technology

    Laboratory ]

    For platform as a service, users pay only for the platform software components such as web

    application environment, databases, OS instances, and middleware, on top of which applications

    are launched. Google App Engine, Microsoft Azure, and Force.com are foremost examples ofplatform as a service.

  • 8/12/2019 55256765 Cloud Computing Foundation

    15/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 15

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 15

    Infrastructure-as-a-Service ModelTenant 1 Tenant 2

    Application

    Storage

    Networking

    Application

    Web/AppServer

    Web/AppServer

    Middleware MiddlewareMiddleware

    Databases Databases

    OS OS

    Hired Resources

    You pay for the infrastructurecomponentsStorageNetwork Connectivity

    Your OS image and applicationson top

    Examples:Amazon EC2EMC Atmos

    This slide illustrates the Infrastructure as a Service (IaaS) model. The capability provided to the

    consumer is to provision processing, storage, networks, and other fundamental computing

    resources where the consumer is able to deploy and run arbitrary software, which can include

    operating systems and applications. The consumer does not manage or control the underlying

    cloud infrastructure but has control over operating systems, deployed applications, and possibly

    limited control of select networking components for example host firewalls.

    [Source: National Institute of Standards and Technology (NIST), Information Technology

    Laboratory ]

    To use infrastructure as a service, cloud service user only pays for the infrastructure components,

    which include storage and networking resources. Amazon EC2 is an example of infrastructure

    as a service. It allows user to build virtual machines and install their software on top of it. EMCAtmos is the first multi-petabyte information management offering, designed to help customers

    automatically manage and optimize the delivery of rich, unstructured information across large-

    scale global cloud storage environments.

  • 8/12/2019 55256765 Cloud Computing Foundation

    16/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 16

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 16

    Types of Cloud Computing - 1

    Private Cloud

    Public Cloud

    Cloud computing can be classified into three deployment models, private, public, and hybrid,

    which provide a basis for how cloud infrastructures are constructed and consumed.

    In Private Cloud, infrastructure is deployed and operated exclusively for an organization or

    enterprise. It may be managed by the organization or by an independent third party and may

    exist on-premise or off-premise at a hosting facility.

    Public Cloud infrastructure is available to public or many industry groups or customers. It is

    owned by the organizations promoting and selling cloud services. This can also be thought of as

    an on-demand and a pay-as-you-go environment where there are no on-site infrastructure or

    management requirements; however, the environment is no longer within the customers

    perimeter.

    [Source: NIST]

    Popular examples of public clouds include Amazons Elastic Compute Cloud (EC2), Google

    Apps, and Salesforce.com.

  • 8/12/2019 55256765 Cloud Computing Foundation

    17/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 17

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 17

    Types of Cloud Computing - 2

    Hybrid Cloud

    +

    Hybrid Cloud is a composition of two or more clouds, private and public. Each cloud retains its

    unique entities. Clouds may be federated or bound together by technology, enabling data and

    application portability. Hybrid cloud is prevalent for several reasons. For example, many

    organizations have existing private cloud infrastructure and may need to extend their capability,

    or often the benefits of combining both private and public clouds may be a more efficient model

    to handle an unexpected surge in the application workload.

    [Source: NIST]

    Most large organization CIOs are holding off on putting their computing requirements on public

    cloud, but leading to develop private cloud. In this case, critical customer data can be restricted

    within an organizations private cloud; however management and monitoring applications can

    run on public cloud. Customer gets updates from the public cloud and can send queries. Both theclouds remain partitioned from each other, however, together they form a hybrid cloud.

  • 8/12/2019 55256765 Cloud Computing Foundation

    18/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 18

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 18

    Cloud Benefits - 1

    High availability

    Reduced risk

    Flexible scaling

    No infrastructure management complexity

    Increased capability

    Improved performance

    Lower cost

    Let us list and discuss various cloud benefits:

    Increased capability: Consumers can leverage cloud service providers expertise forinfrastructure management, backup, disaster recovery, load sharing, data compression, de-

    duplication, encryption, and security services.

    Improved performance: Performance can be scaled up by distributing CPU intensive tasks to

    multiple offsite locations. For example, a sudden surge in the workload during peak season can

    be handled by dynamically allocating additional computing resources within the cloud for the

    workload.

  • 8/12/2019 55256765 Cloud Computing Foundation

    19/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 19

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 19

    Cloud Benefits - 2

    High availability

    Reduced risk

    Flexible scaling

    No infrastructure management complexity

    Increased capability

    Improved performance

    Lower cost

    Lower cost: Cloud services can be hired, therefore, cloud consumers can save money as there is

    no capital expenditure or CAPEX required. Customers leverage cloud service providers

    infrastructure, hence there is no ongoing expenses for running datacenter such as cost of power,

    HVAC system, additionally real estate cost can be minimized.

    Cloud computing allows companies to only pay for the computing resources they access on a

    metered basis. Organizations can curb their operational expenditure, or OPEX, by only using

    cloud resources when it is required and terminate the service after their job is done. Cloud

    consumers can further reduce their cost by leveraging automated tiered services offered by the

    cloud service providers. For example, if your company is using Infrastructure as a Service and

    your application workload is not demanding, your application and operating system can be

    redirected from using tier 1 to tier 2 storage.

    Cloud resources can be shared among multiple consumers or tenants, although mechanisms

    built-in the cloud prevents them to know about each others existence. Sharing of resources

    further lowers the rent of cloud services.

    When running your applications in the cloud, it means you are paying for their staff to service

    your business needs. That allows you to redeploy your existing staff to other projects

    specifically tied to your business rather than providing a utility service such as e-mail. This also

    reduces the time to market.

  • 8/12/2019 55256765 Cloud Computing Foundation

    20/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 20

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 20

    Cloud Benefits - 3

    High availability

    Reduced risk

    Flexible scaling

    No infrastructure management complexity

    Increased capability

    Improved performance

    Lower cost

    High availability: Cloud computing has the ability to ensure application availability withvarying levels depending on customer policy and priority of the application. Redundant server,

    network resources, and storage equipment along with clustered software enables fault tolerance.These techniques encompasses multiple datacenters in different geographic region havingidentical resource configuration and application instances, which prevents data unavailabilitydue to regional failures. Clustered resources are synchronized and user data is replicated so thatcloud service users can be non-disruptively moved to standby resources. Only a virtual view ofdistributed computing resources are provided to the customers, virtual to physical resourcemapping remains hidden to the consumer. Therefore, this movement is transparent to the cloudservice users.

    Reduced risk: Another fundamental advantage of cloud is there is no risk of investing largeamount or signing long term agreement. If the project is not viable, you stop paying for it and ifneeded, change the cloud services immediately. Cloud is ideal for test and experimenting withnew software.

    Flexible scaling: Cloud can be easily and instantly scaled up and down based on demand. Itappears to the consumers that cloud resources are expandable to infinite limit. Cloud allows selfservice requesting. Cloud service users can independently and automatically scale theircomputing capabilities without any human interaction with cloud service providers.

    No infrastructure management complexity: Because cloud resources can be hired, thiseliminates monitoring, provisioning, backup, replication, and maintenance issues.

  • 8/12/2019 55256765 Cloud Computing Foundation

    21/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 21

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 21

    Module Summary

    Key points covered in this module:

    Cloud computing definition and offerings Evolution of cloud computing

    Cloud services

    SaaS, PaaS, and Iaas model

    Types of cloud computing

    Private, public and hybrid cloud

    Benefits of cloud computing

    Appl ication

    Web/App Server

    Middleware

    Databases

    OS

    Storage

    These are the key points covered in this module. Please take a moment to review them.

  • 8/12/2019 55256765 Cloud Computing Foundation

    22/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 22

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 22

    Module 2: Cloud Infrastructure

    Upon completion of this module, you will be able to:

    Detail various components of cloud computing Describe cloud infrastructure layers

    Explain the series of cloud computing processes toenable a service

    Describe cloud storage infrastructure

    Describe the steps for storing file to cloud storage

    The objectives for this module are shown here. Please take a moment to read them.

  • 8/12/2019 55256765 Cloud Computing Foundation

    23/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 23

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 23

    Cloud Components

    Client DevicesUser Access Interface

    Back-end

    Front-end

    Cloud Services(SaaS,PaaS,laaS)

    (cloud OS, middleware, securitytool, management tools, loadbalancing tool, metering tool,automation tool)

    Cloud Hardware Cloud Software

    (server, storage, interconnectivitydevices)

    Cloud computing architecture is the unification of modular components to provide cloud

    services. These components can be broadly classified as front-end, and back-end. The front-end

    includes users computing devices which may be wireless or wired to a LAN and user interfaces

    to access cloud offerings. Back-end consists of underlying cloud computing infrastructure

    responsible for providing cloud services. A network, typically internet, must exist to connect

    front-end and back-end components.

    User interface can be web services APIs, specified by cloud providers or web based program,

    such as e-mail application, which runs on a standard web browser. Back-end components are

    cloud software, hardware, and services.

    Cloud hardware includes servers, data storage systems, and interconnectivity devices.

    Cloud software encompasses cloud operating system, and middleware. Cloud operating system

    enables expansion of the server, storage, and network virtualization beyond physical datacenter

    by pooling resources from multiple sites. The resources are aggregated and federated together so

    that applications can act on the single pool of resources. Middleware such as messaging tools

    facilitates communication among network connected cloud resources. Other software are,

    security tools, management tools such as monitoring, provisioning, and disaster recovery tools,

    load balancing tool, metering tool, and automation tools which enable self service requesting.

    On top of cloud hardware, and software, cloud services such as SaaS, PaaS, and IaaS are

    enabled, cataloged, and published.

  • 8/12/2019 55256765 Cloud Computing Foundation

    24/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 24

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 24

    Cloud Infrastructure Layers - 1

    ServicesCatalog of available services

    Options, parameters

    Service Management

    User request management

    Provisioning, performance tuningMetering

    DR/ backup

    License managementInformation security management

    Aggregation LayerCloud OS, mobility software, middleware (Virtual Image

    deployment, workload management, integrated security,high availability), interconnecting devices

    Virtualization Layer Virtualization Layer

    Servers Storage Netw orkServers Storage Network

    This slide looks at the layered appearance of cloud infrastructure.

    The bottom layer consists of physical resources, including servers, storage systems, and networkcomponents, which are physical elements of a datacenter. The virtualization layer is used to

    create virtual resources and map virtual resources to physical elements of a datacenter. Server,

    storage, and network virtualization technologies take pivotal roles to create the virtualization

    layer. An organization may have islands of such virtualized resources scattered across the

    globe.

  • 8/12/2019 55256765 Cloud Computing Foundation

    25/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 25

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 25

    Cloud Infrastructure Layers - 2

    ServicesCatalog of available services

    Options, parameters

    Service Management

    User request management

    Provisioning, performance tuningMetering

    DR/ backup

    License managementInformation security management

    Aggregation LayerCloud OS, mobility software, middleware (Virtual Image

    deployment, workload management, integrated security,high availability), interconnecting devices

    Virtualization Layer Virtualization Layer

    Servers Storage Netw orkServers Storage Network

    The aggregation layer extends the virtualization concept beyond physical datacenter by

    aggregating virtualized and physical computing resources located at various offsite locations.

    Aggregation layer provides a virtual view of resources, as one big resource, or as many little

    ones. Aggregated resources form the basis of cloud which is managed centrally as a single pool

    of computing resources. All the network communication between distributed resources are

    optimized to enable seamless workload distribution and data mobility among the sites. The

    mobility and distribution is transparent to the cloud users.

    Cloud operating system is responsible for aggregating distributed resources and provides virtual

    view of these resources. Mobility tools, and middleware software have key roles in workload

    distribution, virtual image to physical resource allocation, integrated security, and failover.

  • 8/12/2019 55256765 Cloud Computing Foundation

    26/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 26

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 26

    Cloud Infrastructure Layers - 3

    ServicesCatalog of available services

    Options, parameters

    Service Management

    User request management

    Provisioning, performance tuningMetering

    DR/ backup

    License managementInformation security management

    Aggregation LayerCloud OS, mobility software, middleware (Virtual Image

    deployment, workload management, integrated security,high availability), interconnecting devices

    Virtualization Layer Virtualization Layer

    Servers Storage Netw orkServers Storage Network

    The service management layer runs service management software, which automates the user

    request fulfillment process by sending instructions to the aggregation layer. This software

    enables self-service provisioning and performance tuning, metering such as bandwidth and

    storage usage, business continuity policies such as number of replicas for disaster recovery, and

    license management. In addition to that, the software has either in-built security mechanism or

    the capability to interact with external security services to implement authentication, access

    control, and auditing features.

    On top of the stack is the services layer, which publishes catalogs of available cloud services for

    cloud users. When a service is selected, this layer may provide a list options and parameters

    associated to the service. Cloud users may select appropriate options and necessary parameters

    to customize a service.

  • 8/12/2019 55256765 Cloud Computing Foundation

    27/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 27

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 27

    How Cloud Works - 1Cloud Service Provider

    User request (User ID + service

    Service Delivery

    User interface

    Catalog of published services

    Options and settings

    Cloud Service Userparameters)

    Maintain

    Cloud

    Services

    Create

    Publish

    The model of delivering cloud services can be segregated into two entities: Cloud service user

    and cloud service provider. Cloud service providers create, publish, and maintain cloud services.

    Cloud service users can be an administrator of the cloud service consumers organization who

    requests a service for employees, or an individual. Users can view a catalog of published

    services and select necessary options using web browser or web service APIs. When a user

    selects or requests a service, user identity information plus selected service parameters are

    transferred to the service provider.

  • 8/12/2019 55256765 Cloud Computing Foundation

    28/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 28

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 28

    How Cloud Works - 2Cloud Service Provider

    Validation of user identity

    User request management tools processes userrequest and initiate user request fulfillment

    operation

    User request management process sends instructionsto the aggregation layer

    Aggregation layer creates virtual image by aggregating necessaryphysical resources or uses preconfigured template

    Launch user specified application and platform software on virtualimage

    (provisioning, performance tuning, monitoring, metering,policy, security)

    User request (User ID + service

    Service Delivery

    User interface

    Catalog of published services

    Options and settings

    Cloud Service Userparameters)

    Cloud service providers validate the user identity as part of security services they offer. After

    validation, user request management tools process user request and initiate user request

    fulfillment operations. A user request management process sends instructions to the aggregation

    layer to provision cloud resources for creating virtual image. The service parameters are

    implemented while creating a virtual image from distributed physical and virtual resources, and

    a user ID is used to set policy for the requested service. A policy can be associated with business

    continuity, archiving, resource location, etc. For example, a storage service may be allied with a

    policy to create three synchronous replicas and one asynchronous replica at specific locations or

    to set a retention period during which data cannot be modified. Otherwise, preconfigured image

    templates, maintained by the cloud service providers, are used to assign virtual images.

    In addition to this, cloud service providers offer monitoring services so that users can observe

    the performance of virtual image they created and may change the settings, if required. Cloud

    providers associate metering service to enable pay-as-you-go feature.

    Once the virtual image is ready, user specified applications and platform software may be

    launched on top of the virtual image. Now the user can leverage the specified service.

    Note that, at any time a user can update or terminate the service, depending upon their role and

    privilege. Termination of service destroys the image and releases cloud resources.

  • 8/12/2019 55256765 Cloud Computing Foundation

    29/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 29

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 29

    Cloud Storage Infrastructure - 1

    NAS, iSCSI, SAN

    Isolated Virtualized Storage Devices

    Aggregation or pooling of Virtual/physical storage devices

    Distributed Physical Storage Devices

    Cloud storage services are created on top of cloud storage infrastructure, which mostly consists

    of elements found in enterprise datacenter. However, these elements are integrated and

    provisioned in such that their combined capability can be raised dynamically according to the

    need of cloud users.

    Aggregation technology enables pooling of virtual or physical storage devices scattered at

    various geographic locations using NAS, iSCSI, and SAN protocols. This pool of storage

    resources are managed as a single entity which simplifies and facilitates the placement and

    tracking of application data among physical storage devices.

  • 8/12/2019 55256765 Cloud Computing Foundation

    30/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 30

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 30

    Cloud Storage Infrastructure - 2

    NAS, iSCSI, SAN

    Isolated Virtualized Storage Devices

    Aggregation or pooling of Virtual/physical storage devices

    Cloud storage functionalities(High scalability and performance, virtual provisioning, securityData protection, de-duplication, encryption, compression, tiering,

    Load balancing, replication, backup, archive, chargeback)

    Distributed Physical Storage Devices

    Cloud storage service providers typically set up storage infrastructures that can handle large

    workloads to ensure sudden demand of storage resources, performance, and availability.

    Therefore cloud storage devices must have functionalities like high scalability, high

    performance, virtual and automated provisioning, security control and data protection.

    Enterprise datacenters also leverage these functionalities; however, they are deployed at mass

    scale so that cloud users feels that the storage infrastructure is stretchable to infinite limit.

    Other functionalities are de-duplication, encryption, compression, tiered storage service, load

    balancing, replication, backup, archiving, and chargeback.

  • 8/12/2019 55256765 Cloud Computing Foundation

    31/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 31

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 31

    Cloud Storage Infrastructure - 3

    NAS, iSCSI, SAN

    Isolated Virtualized Storage Devices

    Aggregation or pooling of Virtual/physical storage devices

    Cloud storage functionalities(High scalability and performance, virtual provisioning, securityData protection, de-duplication, encryption, compression, tiering,

    Load balancing, replication, backup, archive, chargeback)

    User request management(Policy management, resource management)

    Distributed Physical Storage Devices

    User request management process typically runs on a storage service node and receives user

    request for creating, updating, and discarding service, as well as for storing data to the cloud

    storage. It invokes user request fulfillment processes for policy management and resource

    management. These processes pass instructions to the aggregation layer to create suitable virtual

    storage devices. Applying a storage services policy for a specific user or application data is a

    two step operation:

    Step 1: Categorization of the data based on service metadata and user ID

    Step 2: Define functionalities for storing data of each category

    Resource management process is responsible for optimized data placement, clustering, and

    tracking of data locations. Optimization enables faster storage and retrieval of user data. For

    example, striping data across all cloud storage drives containing an application data to improve

    I/O performance, or data may be read from the same location as the client request or data may

    be read from the replica that is the fewest network hops away.

  • 8/12/2019 55256765 Cloud Computing Foundation

    32/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 32

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 32

    Cloud Storage Infrastructure - 4

    Cloud user access interface

    Cloud storage services interface (NFS/CIFS, SOAP,REST)

    NAS, iSCSI, SAN

    Isolated Virtualized Storage Devices

    Aggregation or pooling of Virtual/physical storage devices

    Application, and platform software/middleware

    Exported cloud optimized storage devices (FC, iSCSI)

    Cloud storage functionalities(High scalability and performance, virtual provisioning, security

    User request management(Policy management, resource management)

    Distributed Physical Storage Devices

    Data protection, de-duplication, encryption, compression, tiering,

    Load balancing, replication, backup, archive, chargeback)

    Cloud storage services interface publishes services offered by the cloud storage provider, allow

    user or application to request a service, and export cloud optimized storage devices. Data

    coming from user or application are treated as object and a unique object ID is used for object

    reference. Applications can leverage exported cloud storage devices when storage service

    request is fulfilled. User or application access to the storage services may require NFS or CIFS

    connections and web object interface protocols such as HTTPs, SOAP, and REST.

  • 8/12/2019 55256765 Cloud Computing Foundation

    33/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 33

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 33

    Storing a File to Cloud Storage - 1

    Store and retrieve user data as object

    Irrespective of file level, block level, or streaming bits

    Object ID is used for reference

    Object metadata is used to enforce policies

    Object ID is returned to users application

    Data retrieved using only object ID, end-to-end

    Database maintained to locate physical storage

    resources for each object ID

    Cloud storage infrastructure stores and retrieves all incoming user data as object, regardless of

    file level, block level, or streaming bits of information. For example, an object can be a word

    document, pdf file, or a video file; however, they are treated as object stored at the cloud virtual

    storage and identified by an object ID. Object descriptors or metadata such as identity of

    application or user who has created data, content type of the object, date of creation are also

    transferred along with the user data which are used to enforce policies and functionalities for the

    object. This object ID is returned to the users applications so that a file can be retrieved using

    only object ID end-to-end. Cloud resource management process maintains database for physical

    storage resources for each object ID, which speeds up storing, update, and retrieval of user data.

  • 8/12/2019 55256765 Cloud Computing Foundation

    34/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 34

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 34

    UserRequest

    Management Node

    Virtual image of storage

    Physical Storage location 1

    Physical Storage location 2

    Physical Storage location 3

    Cloud Storage

    Services Interface

    Policy

    management

    Resource

    management

    Appl icationWebService

    API

    OS

    1

    Thin Client

    2

    2

    3

    4 4

    5

    6

    6

    Storing a File to Cloud Storage - 2

    1. Thin client passes file to application

    2. Application sends the request and the file tocloud storage using web service protocols suchas SOAP/REST

    3. Cloud storage service interface passes the fileand metadata to the user request managementnode

    4. User request management process invokespolicy management process and resourcemanagement process to define policy anddetermine layout

    5. File is stored as object to virtual image which ismapped to distributed physical resources

    6. Object ID is returned to the application throughcloud storage service interface

    Lets have a look at the operational steps of storing a file to the cloud storage. Consider that a

    user, having a thin device, sends a file to the application server which leverages cloud storage.

    Application passes the file to the cloud storage service interface using web service protocols

    such as SOAP, or REST. Cloud storage service interface passes the file and the file metadata to

    the user request management node. This node runs user request management process which

    invokes policy management and resource management processes. Policy management process

    analyze the file metadata and define a strategy for storing the file. Based on the strategy,

    resource management process determines the layout for storing the file. It communicates with

    the aggregation layer technology to create virtual image from the physical storage devices which

    may be located at offsite locations depending on the layout determined before. An object ID is

    generated for the file and passed to the user request management node, along with the layout

    information. User request management node stores the file as objects. Resource managementprocess tracks the physical storage devices for each object ID.

    After storing the object, the object ID is returned to the application via cloud storage services

    interface.

  • 8/12/2019 55256765 Cloud Computing Foundation

    35/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 35

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 35

    Module Summary

    Key points covered in this module:

    Components of cloud computingFront-end and back-end components

    Cloud infrastructure layers

    Cloud service request fulfillment procedure

    Cloud storage infrastructure

    Steps for storing file to cloud storage

    These are the key points covered in this module. Please take a moment to review them.

  • 8/12/2019 55256765 Cloud Computing Foundation

    36/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 36

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 36

    Module 3: Migration To Cloud

    Upon completion of this module, you will be able to:

    Understand cloud migration consideration Describe process and steps to cloud move

    Identify right cloud model for your organization

    Discuss private cloud as a preferred choice fororganizations

    Understand factors for choosing right application for cloudmove

    The objectives for this module are shown here. Please take a moment to read them.

  • 8/12/2019 55256765 Cloud Computing Foundation

    37/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 37

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 37

    Are You Ready For The Cloud??

    CIOs/IT Managers seeking move to cloud faces severalquestions:

    How do I start with the cloud?

    Do I need to re-configure my infrastructure?

    Does cloud infrastructure support myapplication?

    Is the cloud infrastructure capable of

    providing required QoS?

    How will I address Change Management and integrationconcerns?

    Enterprises are not only looking to get a financial advantage with their first cloud move but also

    making a significant learning experience to gradually expand their cloud perspective.

    Businesses, determining how to make their first move into the cloud always face a question

    How do I start with the cloud? since a risk of introducing immature clouds into an established

    system.

    Most companies are not ready to abandon their existing IT investments to move all of their

    business processes fully to the cloud at once. Instead, it is more likely to be a gradual shift in

    business processes to the cloud over time, similar by nature to a perpetual proof of concept. The

    reason behind this hesitation is the cloud providers are not offering the same levels of security,

    controls, and performance assurances that organizations have on-premise. And there is lack of

    sufficient regulatory compliances and policies.

  • 8/12/2019 55256765 Cloud Computing Foundation

    38/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 38

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 38

    Migration To Cloud Considerations - 1

    Understand How cloud fits to your requirements

    Understand current infrastructure and requirements

    Application perspective, network perspective and security perspective

    Business processes and policies

    Consider Risk Vs Convenience profile

    Enterprise

    SMB

    Startup

    Individual

    Convenience

    Risk

    Any organization considering a move to the cloud needs to understand and address various

    concerns which can make their perceived benefits short-lived. Studies based on experience of

    cloud early adopters suggest that moving to the cloud without proper strategy and process does

    not make much sense. The most important concern that needs to be evaluated before making a

    move to cloud is How cloud computing fits in the context of organizations overall business

    strategy. Sometimes a cloud may look great from an application perspective, but may be a

    challenge for network administrator in a real time environment, or security may say no to have

    data outside of the firewall.

    Risk versus convenience is a key consideration for deciding cloud migration strategy. Cloud

    benefits are well established, but data may reside outside the organizations perimeter which

    involves risk. A balance must be evaluated to determine how much risk an individual or

    organization may handle for the sake of convenience. This proportion varies among cloud

    consumers, based on they may be segmented into individual, business startup, small and

    medium business, and enterprise. Typically, individuals and startup businesses are ready to take

    high risk to get most of the convenience offered by a cloud. Compared to that, SMBs and

    enterprises are more sensitive to risk and are unlikely to move their tier 1 applications to a

    cloud.

  • 8/12/2019 55256765 Cloud Computing Foundation

    39/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 39

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 39

    Migration To Cloud Considerations - 2

    How to integrate with existing IT system

    To ensure desired performance, availability and security

    Identify best fit cloud model for your organization

    Private or public or hybrid

    Plan and strategize your move

    Understand impact, risk and benefits

    Understand billing model

    Another concern is How to integrate cloud computing into existing IT systems and applications

    to ensure performance, availability and security. According to analysis, most CIOs and IT

    executives cite security as their primary concern to cloud computing. Integrated cloud

    computing involves moving sensitive data between the cloud and in-house networks, and effects

    the data security.

    A decision to move to cloud should be based on the understanding of which cloud computing

    model will be most suitable for the organization. We will discuss and identify the best fit cloud

    model for different cloud service user in the next slide.

    While designing a cloud strategy, organizations need to identify integration requirements for

    each process and system and determine the number of simultaneous requests to be handled.

    They also need to ensure availability of information, even if the cloud or in-house source goesdown. In other words, enterprises should not consider cloud as an alternative but as an added

    architecture that provides more value from IT resources, while preserving enterprise process,

    policies, and security.

  • 8/12/2019 55256765 Cloud Computing Foundation

    40/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 40

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 40

    What Model Fit for You

    Public Cloud

    Convenience Outweighs Risk Low Cost or Free Email, eCommerce, Social

    Nets, Gaming

    Hybrid Cloud

    Tier 1 Apps: Private cloud Tier 2-4:

    Public cloud for Backup,Archive, testing

    Non OLTP Apps

    Public Cloud Convenience Outweighs Risk CAPEX VS OPEX Self-Service Back Office, Development, &Production

    IndividualIndividual StartupStartup SMBSMB EnterpriseEnterprise

    Private and Hybrid Cloud Tier 2-4: Private cloud Hybrid cloud:

    Public cloud for Backup,Archive, testing,Websites, portals

    Lets understand which cloud computing model will be most suitable for an organization or

    individual.

    Public cloud is preferred by individuals who want to access e-mail, e-commerce, or gaming

    applications, and least bothered about the security or availability risks in cloud for the most part.

    Here cost reduction is the primary objective. Public cloud enables the opportunity to access

    these applications using a thin device for free or by paying minimum usage charges. People

    starting up businesses from small office or home typically opt public cloud. A large investment

    to purchase IT resources are not affordable or sensible. Therefore, for obvious reason,

    convenience offered by the cloud outweighs risk.

    Small and medium sized business have a moderate customer base and any anomaly in customer

    data and service levels may impact their business. Hence, they may not be willing or able to putTier 1 applications such as OLTP in the cloud. A hybrid cloud model may fit in this case, which

    includes organizations internal IT resources and external public cloud resources. Tier 1

    application data should never cross the boundary of private cloud. Public cloud enables cost

    savings and faster time to market and is typically used for tier 2, tier 3, and tier 4 applications

    such as backup, archive, and testing. Enterprises typically have strong customer hold worldwide

    and priority is to maintain critical customer data and service levels with strict enforcement of

    security policies. They are highly concerned with the risk and information access control in

    cloud. Many organizations may not even virtualize their tier 1 applications. They are financially

    capable of building a massive private cloud, however, a hybrid cloud model could be a viableoption.

  • 8/12/2019 55256765 Cloud Computing Foundation

    41/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 41

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 41

    First Step To Cloud: Virtualization

    Optimize existing resources virtualize the data center

    Combine resources together and abstract them to create a virtual world

    Virtualization of application and infrastructure

    Extend the virtualization beyond a data center

    Pool all your distributed resources from multiple sites

    Virtualized Infrastructure

    APP

    OSAPP

    OS

    APP

    OS

    APP

    OS

    APP

    OSAPP

    OS

    APP

    OSAPP

    OS

    APP

    OSAPP

    OS

    APP

    OS

    APP

    OS

    Data Center Location 1

    APP

    OSAPPOS

    APPOS

    APPOS

    APPOS

    Data Center Location 2

    APP

    OSAPPOS

    APPOS

    APPOS

    APPOS

    In many ways, the cloud computing is an evolution of what is already happening in data centers:

    virtualization, automation and dynamic infrastructure provisioning, all aimed at creating real-

    time infrastructures for flexible and dynamic service delivery.

    Virtualization is considered to be the first step to cloud computing, With virtualization as an

    underpinning, not only do enterprises get the benefit of increased asset utilization, but also take

    the first step toward cloud by defining their applications, independent from their physical

    infrastructure. With virtualizing and aggregating computing resources into a single pool, you

    have the opportunity to operate more efficiently and also operate more flexibly and reliably.

    You can start using this shared infrastructure for doing test and development or for doing better

    disaster recovery, for example two data centers that act as failover for one another.

    Virtualization also provides a level-up in managing your IT by helping you to get away from

    issues of underlying infrastructure. With virtualization, you can also automate a lot of the

    general management tasks, extricating IT from the business of repetitive management

    procedures, and at the same time enabling your end users to get what they need very quickly.

  • 8/12/2019 55256765 Cloud Computing Foundation

    42/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 42

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 42

    Private Cloud As a Preferred Option

    Most large organizations are experimenting first with private clouds

    Cloudification of pooled & virtualized internal computing resources involves

    Centralized service management, service creation, automation Self service, auto provisioning, metering, load balancing, security, tiering

    Cloud Operating System

    APP

    OSAPP

    OS

    APP

    OS

    APP

    OS

    APP

    OSAPP

    OS

    APP

    OSAPP

    OS

    APP

    OSAPP

    OS

    APP

    OS

    APP

    OS

    APP

    OSAPP

    OS

    APP

    OS

    APP

    OS

    Data Center Location 1 Data Center Location 2 Data Center Location 3

    After aggregating and virtualizing an organizations IT resources, the next step is to enforce

    centralized service management, service creation, automation, and associate processes and

    technologies such as self-service, metering, load balancing, business continuity, security,

    automated tiering, and de-duplication. This forms a private cloud with internal IT resources as

    its base. Based on the demand of a cloud service user, virtual images with required configuration

    are created and operating system and applications are launched on top of them. The cloud

    operating system and middleware have key roles in consolidation of resources, providing virtual

    view of these resources, workload distribution, virtual image to physical resource allocation,

    integrated security, and failover.

  • 8/12/2019 55256765 Cloud Computing Foundation

    43/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 43

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 43

    Private Cloud Federating with External Cloud

    A blend of internal and external cloud resources to present aseamless, managed service delivery to the business

    Probably offers the best value to the enterprise

    Cloud Operating System

    APP

    OSAPP

    OS

    APP

    OS

    APP

    OS

    APP

    OSAPP

    OS

    APP

    OSAPP

    OS

    APP

    OSAPP

    OS

    APP

    OS

    APP

    OS

    APP

    OSAPP

    OS

    APP

    OS

    APP

    OS

    Private Cloud

    Cloud

    External

    Internal Cloud

    Data Center Location 1 Data Center Location 2

    Finally, once your private internal cloud has been streamlined, there is an opportunity to

    federate with external infrastructures provided by the cloud service providers, blending the two

    into a single collection of resources that your organization can use. The key is that they are

    never separate resources, they are all one pool. External cloud resources can be seamlessly and

    transparently joined when needed. Federation allows rapid elasticity of cloud resources and

    provides a sense of unlimited scalability to the cloud service users.

    Now let us understand how can we get the best of both worlds the internal cloud and the

    external cloud without getting the weakness of either.

  • 8/12/2019 55256765 Cloud Computing Foundation

    44/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 44

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 44

    Why Private Cloud Get the Best of Both World

    Federation

    Security

    Virtualization

    Information

    Flexible

    Dynamic

    On-demand

    Efficient

    Trusted

    Control

    Reliable

    Secure

    External CloudInternal Cloud

    What we like about data centers is that theyre rock-solid, trusted, controlled, reliable, and

    secure. But they can be expensive.

    What everyone finds so appealing about cloud computing is the pay by the drink, elastic nature

    of the resources flexible, dynamic, on-demand, and efficient meaning cost effective. We

    have a vision that joins the best of both world without the downside of either.

    The resources are aggregated and federated together so that applications can act on the

    combined resources as a single pool of resources, just like the single pool of resources available

    to us today when we use VMware to join servers from multiple racks in a data center.

    This forms the private cloud that enables us to get the best of both worlds. The word Private is

    used because the use and operation of the cloud resources are completely controlled and only

    available to the enterprise. A cloud resource looks and behaves just like the resources you

    purchased outright in the past.

  • 8/12/2019 55256765 Cloud Computing Foundation

    45/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 45

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 45

    CHOICEFederation

    with compatibleservice providers

    CONTROLUnified

    Management

    EFFICIENCYVirtualization

    and

    Consolidation

    Path to Private Cloud

    Move apps into

    virtual

    machines

    Manage and

    Automate the

    Infrastructure

    Optimize use ofFederated

    resources

    Deliver IT as a

    Service

    The three top value points of private cloud are efficiency, control and choice. The private cloud

    delivers uncompromised control, in the most efficient manner, while fully preserving customer

    choice.

    Efficiency Private cloud eliminates unnecessary/unused IT investment, makes better use of

    what you have, and minimizes resources needed to manage and maintain IT. Translated into

    business terms, efficiency drives both capex and opex savings. It changes the old model of

    application and information delivery that is tied to specific systems and architectures, and moves

    to a self-managed, dynamically optimized environment. The result is a more efficient delivery

    of business services.

    Control Private cloud enables the business and IT to determine service levels together and

    fully control the quality-of-service for application delivery without compromise. Theautomation, control and insight of the physical world and the virtual world with the focus on

    service delivery is what enables IT to shift away from running IT to delivering IT.

    Choice The ability to join resources together to aggregate and federate resources means

    that IT has new choices, and new options available. Why buy the infrastructure needed to run

    the operation at peak load when external cloud resources can be seamlessly and transparently

    joined when needed?

  • 8/12/2019 55256765 Cloud Computing Foundation

    46/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 46

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 46

    What you need to be Cloud Enabled

    Deduplication, Compression, Thin Provisioning

    Spin-down, Low Power Drives

    FAST Automatic Tiering Self-Config, Self-Heal, Self-Manage

    Virtual Provisioning

    On-Demand /Self Service

    ResourcePooling

    RapidElasticity

    Policy-driven data migration Federation of Virtual Archives

    Automatic Failover with SRM

    CapabilitiesRequirement

    Choice

    Efficiency

    Efficiency Choice

    Control

    What i t Delivers

    Efficiency (On Demand) Control (Self-service)

    Multi-protocol FC, iSCSI, NAS, MPFS

    REST, SOAPBroad NetworkAccess

    Choice

    Efficiency

    MeasuredServices

    Choice

    Control

    Resource usage can be monitored, controlled,reported

    Billing/metering systems to chargeback for usage

    The slide lists the requirements and capabilities to be cloud enabled. Please take a moment to

    review them and the values they deliver.

  • 8/12/2019 55256765 Cloud Computing Foundation

    47/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 47

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 47

    Experiment with Public Cloud

    For Non-core business applications

    Best option for individuals or startups For beginners

    No investment risk and infrastructure expertise required

    Web developers, or niche players

    A simple, low-cost way to load and go

    Experimenting

    Software evaluation can be performed in the cloud, before purchase

    Faster deployment of new applications

    No hardware dependency and integration

    Good for seasonal computing needs

    Leveraging the Public cloud is often the best option for non-core business applications for

    SMBs, or startups and individuals, where they can quickly realize the potential cost saving

    benefit without spending in infrastructure. Cloud is also an attractive option for development

    and testing of new applications without investing in infrastructure, when you are not sure

    whether the project will pass the proof of concept. With the cloud options, software evaluation

    can be performed before purchasing licenses or support.

  • 8/12/2019 55256765 Cloud Computing Foundation

    48/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 48

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 48

    Path to Public Cloud

    First step is virtualization of available resourcesApplication and infrastructure virtualization

    Second step: Experiment with cloud Prototype application to understand how it work with your

    environment

    For example cloud backups are a great way to introduce to CC

    Measure and document various matrices

    Performance, billing, reliability etc.

    Gain experience and educate stack holders

    Next step: Gradual advancement with cloudBuild business cases to realize capex reduction and better ROI

    Establish polices and practices

    Deploy production applications

    Virtualization of applications and infrastructure provide immediate cost benefit by improving

    utilization and reducing management expenditure. Also as a first step, virtualization provides

    required flexibility and independence to applications from physical infrastructure and make

    them portable to cloud offerings which are based on virtual infrastructure.

    Next step is to choose a right application, usually a non-core application to experiment with the

    cloud. For example, you can start with your e-mail archiving or data backup in a cloud with

    Mozy online. With this step, understand cloud operation and various matrices, such as

    performance, billing, security and bottlenecks.

    Once you gain sufficient experience with cloud experiment, its time to take full advantage by

    deploying more mature applications and processes to scale in the cloud. Establish policies and

    process to gradual advancement with production applications, showcase successes to drive thedemand, and ultimately realize the better productivity, improved profitability throughout the IT

    organization.

  • 8/12/2019 55256765 Cloud Computing Foundation

    49/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 49

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 49

    Choosing Right Application to Start - 1

    Check compatibility between platform software andapplication

    Not all the applications are good for cloud

    Depends on cloud infrastructure capability & QoS

    Applications may suffer due to insufficient b/w, network latency

    Applications with stringent security requirement are unlikely to move

    To access PaaS and IaaS, customers may need to migrate their proprietary or any off-the-shelf

    application of choice to the cloud. Two disparate considerations may arise while an organization

    is planning for migration. The first is cloud computing infrastructure may not support the

    application. This may happen due to incompatibility between platform software and application,

    or maybe the organization is planning to move a legacy application to the cloud.

    The second consideration is related to the justification of moving an application to the cloud.

    Not all the applications are good candidates for cloud, although it may depend on the capability

    of cloud infrastructure and the quality of service offered by cloud providers. For example,

    applications that require real time response may suffer due to insufficient bandwidth, network

    latency, and network congestion. Organizations having a stringent backup window should gaze

    at the bandwidth and latency factors before moving their backup applications to cloud. For the

    same reasons, graphics intensive applications and applications handling large I/O are less likely

    to migrate to the cloud. Also, organizations are unlikely to move their business critical

    applications with strict security requirement to the cloud.

  • 8/12/2019 55256765 Cloud Computing Foundation

    50/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 50

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 50

    Choosing Right Application to Start - 2

    Candidate Applications:

    Non-core applications, to avoid risk, if any

    Applications with unpredictable capacity/workload requirements

    Spike computing applications

    Application development and testing environment

    Any stand-alone application

    Minimal integration impact

    Applications where significant cost benefits can be achieved in ashorter time

    Based on the considerations, various applications may be the right candidate to the cloud

    computing. Start with the applications which are less important to the core business operations

    so the risk associated with them is lower than to core systems, for example a marketing

    campaign web-site or any other web based environment which should not be a core business

    application. Applications with unpredictable workload or capacity requirements may also fit

    well in the cloud computing model as they are candidates of spike computing. Another

    environment can be application development and testing in cloud that can offer an

    organizations own test and development setup. These applications can provide significant

    business benefits, faster project time to market, no capital investment and no skills to expand or

    build new setup. Any standalone applications that don't interact much with other applications

    can also be a good fit for cloud computing.

  • 8/12/2019 55256765 Cloud Computing Foundation

    51/84

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    Cloud Computing Foundations - 51

    Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

    2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 51

    Common Cloud Implementations - 1

    Utilize applications running on cloud (offered as SaaS)

    Business start ups Testing

    Peak computing

    Storage related services

    Web hosting

    This slide discusses some common use cases which reveal the indispensability of migrating to

    the cloud. Organizations or individuals can leverage these ideas to accomplish specific tasks by

    moving to the cloud, which otherwise cost them more.

    Consider a scenario where a single anti-virus program safeguards your organization. However,

    no anti-virus software guarantees hundred percent detection and most recent threats may remain

    undetected for several days. Also, anti-virus software themselves may be vulnerable to

    malicious attack. Cloud providers offer superior protection against viruses by deploying multiple

    anti-virus engines developed by different vendors. This new approach is called cloud antivirus

    or CloudAV. Suspicious files are screened simultaneously by all the anti-virus programs, hence

    detection capability is more than a solitary antivirus software.

    Come t