T-110.5121 Mobile Cloud Computing Summary 30.11 · 11/30/2011 Teacher: Yrjö Raivio Assistants:...

28
11/30/2011 Teacher: Yrjö Raivio Assistants: Ramasivakarthik Mallavarapu and Koushik Annapureddy Aalto University, School of Science Department of Computer Science and Engineering Data Communications Software Email: {yrjo.raivio, ramasivakarthik.mallavarapu, koushik.annapureddy}(at)aalto.fi Course email: t-110.5121(at)tkk.fi © Y Raivio T-110.5121 Mobile Cloud Computing Summary 30.11.2011

Transcript of T-110.5121 Mobile Cloud Computing Summary 30.11 · 11/30/2011 Teacher: Yrjö Raivio Assistants:...

11/30/2011

Teacher: Yrjö Raivio

Assistants: Ramasivakarthik Mallavarapu and Koushik

Annapureddy

Aalto University, School of Science

Department of Computer Science and Engineering

Data Communications Software

Email: {yrjo.raivio, ramasivakarthik.mallavarapu,

koushik.annapureddy}(at)aalto.fi

Course email: t-110.5121(at)tkk.fi

© Y Raivio

T-110.5121 Mobile Cloud Computing

Summary

30.11.2011

© Y Raivio

• Course targets

• Requirements, course feedback

• Grading

• Exam reading material

• Lecture schedule

• Summary of key issues

• Related courses

Outline

11/30/2011 2

© Y Raivio

• “You have a clear view of the advantages of distributed computing technologies, such as cloud computing, in the mobile space. You understand the core properties as well as the strengths and limitations of mobile cloud computing. You have a vision how clouds will change the mobile ecosystem, reviewed both from technology and business angles.”

• (Mobile) Disruption

• Neutral, scientific and critical view, over the hype

• Technology, Business, Theoretical and Practical approach

Targets

11/30/2011 3

© Y Raivio

• 5 ECTS: 24 + 0 (2 + 0), not applicable to post graduate studies

• Lectures 24 h, Lecture preparation 24 h, Assignments 48 h, Exam

preparation 36 h, Exam 3 h

• Lectures are not obligatory but highly recommendable

• Exam

• Tue 13.12.2011, 9-12, Tue 03.01.2012, 9-12 or Tue 29.05.2012, 9-12

• Initial structure (all rights reserved!):

• 3 questions, 2 must be answered (rougly one page together)

• 1 obligatory question: 6 definitions (one sentence each)

• 1 obligatory essay (roughly one page)

• 6 points from each: 0-11=0, 12-13=1, 14-15=2, 16-18=3, 19-21=4,

22-24=5

• 3 Assignments in pairs

• Course feedback opens 1.12.2011 and closes 13.1.2012

Requirements

11/30/2011 4

© Y Raivio

• Exam 50% + Assignments all together 50%

• Each assignment has the same weight, e.g. 1/3

• All parts evaluated 0-5

• To pass the whole course, each component must be passed at least with grade 1

• Example:

• Exam: 3

• Assignment 1: 3 = 3/3

• Assignment 2: 4 = 4/3

• Assignment 3: 5 = 5/3

Total: 50% x 3 +50% x 12/3 = 3.5 = grade 4 (rounded to closest integer)

Grading

11/30/2011 5

© Y Raivio

1. Armbrust, Michael, Fox, Armando, Griffith, Rean, Joseph, Anthony D., Above the Clouds: A Berkeley View of Cloud Computing, Feb. 10, 2009, (23 pages), available at:

http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf

2. Lee Badger, Tim Grance, Robert Patt-Corner and Jeff Voas: Draft Cloud Computing Synopsis and Recommendations, Recommendations of the National Institute of

Standards and Technology, May 2011, Sections I-III (17 pages), available at: http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf

3. Albert Greenberg, James Hamilton, David A. Maltz and Parveen Patel, The Cost of a Cloud: Research Problems in Data Center Networks, ACM Sigcomm Computer

Communication Review, vol. 39, no: 1, January 2009 (6 pages)

4. Rolf Harms and Michael Yamartino: The Economics of the Cloud, Nov. 2010 (22 pages), available at: http://www.microsoft.com/presspass/presskits/cloud/docs/The-

Economics-of-the-Cloud.pdf

5. Rasmus Paivarinta and Yrjo Raivio: Applicability of NoSQL Databases to Mobile Networks: Case Home Location Register, to be published 2012 (17 pages); Yrjo Raivio and

Rushil Dave: Cloud Computing in Mobile Networks – Case MVNO, ICIN2011 (6 pages)

6. Mohammad Hajjat, Xin Sun, Yu-Wei Eric Sung, David Maltz, Sanjay Rao, Kunwadee Sripanidkulchai, and Mohit Tawarmalani, Cloudward Bound: Planning for Beneficial

Migration of Enterprise Applications to the Cloud, ACM SIGCOMM'10, (Sections 1-2, 2 pages); Ming Mao and Marty Humphrey, Cloud Auto-scaling with Deadline and Budget

Constraints, GRID 2010 (Sections 1-3, 3 pages); Z. Gong, X.Gu and J. Wilkes, “PRESS: Predictive elastic resource scaling for cloud systems”, CNSM 2010 (Sections 1-2, 3

pages)

7. Byung-Gon Chun, Petros Maniatis. Augmented Smartphone Applications Through Clone Cloud Execution. HotOS 2009, (5 pages), available at: http://berkeley.intel-

research.net/bgchun/clonecloud-hotos09.pdf

8. Cloud Security Alliance: Top Threats to Cloud Computing V1.0, March 2010, (14 pages), available from https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

Security Guidance for Critical Areas of Focus in Cloud Computing, v. 2.1, Dec 2009, Section 5, (6 pages), available from https://cloudsecurityalliance.org/csaguide.pdf

Reading material to exam

11/30/2011 6

© Y Raivio

07.09 Introduction, Yrjö R

14.09 Basics, Yrjö R

21.09 Public Cloud, Yrjö R and Karthik M

28.09 Mobile Networks, Jukka K. Nurminen

05.10 Business in a Cloud, Sakari Luukkainen

12.10 Mobile Cloud, Yrjö R

19.10 Private Cloud, Yrjö R and Koushik A

02.11 Mobile Offloading, Matti Kemppainen

09.11 Dynamic Resource Provisioning, Karthik M

16.11 Encapsulated Security in Cloud, Jukka Ylitalo, Ericsson

23.11 Industry keynote, Erkka Ala-Tauriala, NSN

30.11 Summary, Yrjö R

07.12 Spare

Lecture schedule

11/30/2011 7

© Y Raivio

• Key Benefits

• Economies of scale

• Elasticity

• Resource planning

• Pay-as-you-go

• Always available

• Technology

• Virtualization, Storage, SLA, Provisioning, Energy, Security, Mobility

• Pros and Cons

• Differences between cloud types

• Public, Private, Hybrid, Community

• IaaS, PaaS, SaaS

• Amazon EC2 main features

Lecture 14.9: Basics & 21.09: Public

Cloud

11/30/2011 8

Source: Armbrust, Michael, Fox, Armando, Griffith, Rean, Joseph, Anthony D., ”Above the Clouds:

A Berkeley View of Cloud Computing”, Feb. 10, 2009.

© Y Raivio

Definition

11/30/2011 9

“Mobile Cloud computing is a model for enabling convenient, on-demand mobile network access to a shared pool of configurable mobile computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

Adapted from: P. Mell and T. Grance, “The NIST Definition of Cloud Computing”, 2009

© Y Raivio

11/30/2011 10

Traffic load can vary a lot

Source: P. Zerfos et al., “A study of the Short Message Service of a nationwide cellular network”, IMC 2006.

Private cloud

Public cloud

Overprovisioning

Underprovisioning Hybrid cloud

© Y Raivio

Source: Zhang, X. et al. Securing elastic applications on

mobile devices for cloud computing, 2009.

• What are the key issues in mobile networks/terminals related to cloud computing?

• How to minimize energy consumption in mobile

• GSM, HSPA or LTE – any difference

• IaaS, PaaS or SaaS/private or public cloud

• Regulation and security

• SLA (availability, throughput, latency)

Lectures 28.09: Mobile Networks &

23.11: Industry Keynote

11/30/2011 11

Source: Rasmus Paivarinta and Yrjo Raivio, ”Applicability

of NoSQL Databases to Mobile Networks:

Case Home Location Register”, to be published 2012;

© Y Raivio

• Will LTE and cloud computing bring a disruption

• Cost savings

• Energy savings

• Case Amazon – lessons to telecom players?

• Key enablers: ATCA, private cloud, open APIs, market place

• Challenges: installed base, carrier grade SLA, trust

Lecture 05.10: Business in a cloud

11/30/2011 12

Sources: Rolf Harms and Michael Yamartino, “The Economics of the

Cloud; Albert Greenberg, James Hamilton, David A. Maltz and Parveen

Patel, The Cost of a Cloud: Research Problems in Data Center

Networks, Nov. 2010

© Y Raivio

Lecture 02.11: Mobile Offloading

11/30/2011 13

Source: Kumar & Lu, ”Cloud Computing for Mobile Users:

Can Offloading Computation Save Energy ”, 2010

Source: Chun and Maniatis, ”Augmented Smartphone

Applications Through Clone Cloud Execution”, 2009

© Y Raivio

Categories

11/30/2011 14

Source: Chun and Maniatis, ”Augmented Smartphone Applications Through Clone Cloud Execution”, 2009

© Y Raivio

11/30/2011 15

Mobile capabilities are improving but

battery capacity is still a bottleneck

• Less new services

• More frequent charging

• Physically larger battery

• More efficient chips in

energy wise

• Radical battery inventions

• Intelligent methods to save

energy

Energy

consumption

2000 2005 2010 2015 2020

Basic services (voice,SMS)

New

services

Email

Navigation

Multimedia

Social media Web

Battery

capacity

3D

NOK

NOK

NOK

OK

OK

?

Source: professor Jukka K. Nurminen

© Y Raivio

• Why operators should care about cloud computing?

• Role of Open Innovation

• How operators can cope with Internet APIs

• Location information from terminal or network

• SLA, sustainability

• SaaS: End user intervention

• PaaS: Can be shared with other MVNOs

• IaaS: High computation

Lecture 12.10: Mobile Cloud

11/30/2011 16

Source: Yrjo Raivio and Rushil Dave, ”Cloud Computing in Mobile Networks – Case MVNO”, ICIN2011

© Y Raivio

11/30/2011 17

Vision

End users

Mobile

Offloading

Vendor Cloud

Operator

Cloud

Access

Cloud

Access

Cloud

Internet

Open Telco

SaaS SaaS

PaaS PaaS

IaaS IaaS

SaaS SaaS

PaaS PaaS

IaaS IaaS

Hybrid

Cloud

Telecom Cloud

Load varies Load varies

in base

stations

End users move End users move

and use services

unpredictable way

Load varies in core Load varies in core

network elements and

between operators

© Y Raivio

11/30/2011 18

• Higher performance and elasticity

• Economies of scale

• Solutions on all IaaS, PaaS and SaaS layers

• Return on Investment (ROI) improved

• Capex to Opex transition, decrease Opex

• Smaller investment risk

• Lower IT administration costs (1$ IT vs. 8$ admin)

Cloud advantages and disadvantages

• Data security, access and availability are the biggest concerns

• Regulation restricts the transfer of customer sensitive data outside country or region (EU)

• Integration and customization of IT systems may become difficult

• Lack of cloud competences

• Performance of real-time systems like Prepaid, OSS and Network systems

© Y Raivio

Lecture 19.10: Private Cloud

11/30/2011 19

• Cloud computing management software

• Manage infrastructure (private and public)

• Launch VMs into a cloud

• Resource scheduler

• Controls Life-cycle of VMs with the help of Hypervisors

• Storage management

• Network management

• Admin and user interfaces (API/CLI/GUI)

• Provide Image repository/marketplace

• Load balancer

• Accounting/Billing

© Y Raivio

Virtualization

11/30/2011 20

1) Cost Savings

2) Better Resource Utilization

3) Better Memory Management

4) Increased Availability

5) Better Resource Provisioning

6) Energy Saving

APP

1

OS OS

CPU CPU

APP

N

CPU

2

Source: Z. Ou, Virtualization Technology, T-110.7100, Autumn 2010.

..

OS OS

CPU CPU

APP APP APP

1

OS OS

APP

N ..

CPU

1

Hypervisor Hypervisor

Virtual Machines Virtual Machines

..

Single task Multi task Hyper threading Virtualization

APP

1

OS-1 OS-1

APP

N .. APP

1

OS-N OS-N

APP

N ..

© Y Raivio

Lecture 09.11: Dynamic Resource

Provisioning

11/30/2011 21

1. Reactive resource controller

• Detect changes in workload pattern and react to changes after the event occurs

• Suitable for services with predictable workload patterns

• Unreliable for QoS critical services

2. Proactive resource controller (Predictive)

• Predict/forecast changes in workload based on a recent history and react before the event occurs

• Can cater to variable and unpredictable workloads

• Efficiency largely depends on the prediction algorithm

Source: Ming Mao and Marty Humphrey, Cloud Auto-scaling with Deadline and Budget Constraints,

GRID 2010 (Sections 1-3, 3 pages)

© Y Raivio

11/30/2011 22

Architecture

© Y Raivio

• Model the incoming workload pattern • Based on a recent history of workload data, predict (forecast) the future workload • Scale resources based on the predicted workload values well in advance • Resources are scaled before occurrence of the event • Suitable for performance/latency critical services • Most useful for variable incoming traffic and unpredictable workload patterns • Example use cases: Telecom components, online ticketing services, e-commerce applications etc.

Predictive model

11/30/2011 23

ARMA Source: Z. Gong, X.Gu and J. Wilkes, “PRESS: Predictive elastic

resource scaling for cloud systems”, CNSM 2010

© Y Raivio

• Top threats

• Abuse and Nefarious Use of Cloud Computing

• Insecure Application Programming Interfaces

• Malicious Insiders

• Shared Technology Vulnerabilities

• Data Loss/Leakage

• Account, Service & Traffic Hijacking

• Unknown Risk Profile

Lecture 16.11: Security

11/30/2011 24

Source: Cloud Security Alliance, “Top Threats to Cloud Computing V1.0”, March 2010

© Y Raivio

Domain 1: Cloud Computing Architectural Framework ........................................... 13

Domain 2: Governance and Enterprise Risk Management....................................... 31

Domain 3: Legal and Electronic Discovery................................................................. 35

Domain 4: Compliance and Audit ............................................................................... 37

Domain 5: Information Lifecycle Management .......................................................... 40

Domain 6: Portability and Interoperability.................................................................. 46

Domain 7: Traditional Security, Business Continuity, and Disaster Recovery........ 50

Domain 8: Data Center Operations.............................................................................. 52

Domain 9: Incident Response, Notification, and Remediation ................................ 54

Domain 10: Application Security ................................................................................. 57

Domain 11: Encryption and Key Management ........................................................... 60

Domain 12: Identity and Access Management ........................................................... 63

Critical areas of focus

11/30/2011 25

Source: Cloud Security Alliance, ”Security Guidance for Critical Areas of Focus in Cloud Computing, v. 2.1”, Dec 2009.

© Y Raivio

Data Lifecycle Management

11/30/2011 26

Source: Cloud Security Alliance, ”Security Guidance for Critical Areas of Focus in Cloud Computing, v. 2.1”, Dec 2009.

© Y Raivio 11/30/2011

Questions?

Contacts:

Teacher: yrjo.raivio(at)aalto.fi, A122

Assistants: ramasivakarthik.mallavarapu(at)aalto.fi, PlayRoom

koushik.annapureddy(at)aalto.fi, A118

Course staff: t-110.5121(at)tkk.fi