L1 Basic Concepts

Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

Introduction and Basic

Concepts
Lecture 1
Google Classroom for
CS451 Cloud Computing Online Experience
 Muhammad Yasir Khan
 Over 19 years teaching experience to students of more than
15 countries
My  Taught Cisco based Networking, System Administration and
Background Cyber Security courses for more than 9 years in Gulf
 Cisco Network Academy Instructor
and Contact
Details  Computer Science Department
[email protected]
 http://om.linkedin.com/in/myasir
 Resources:
 “Essentials of Cloud Computing”, K. Chandrasekaran, CRC,
2015
 “Cloud Computing, Theory and Practice 2nd Edition”, Dan C.
Marinescu, Morgan Kaufmann, 2018

 One coursework project for Microsoft Azure or Amazon


Course AWS in groups of three students each.
 The project will be assessed via a project report and code
Logistics testing.

3
Topic Week #
1. Introduction 1
2. Cloud Service Model and Types of Clouds 2
3. Virtualization (Type 1 and Type 2) 3-4
4. Tutorial 1 – Installation and deployment of VMWare Workstation 4
5. Tutorial 2 – ESXi Server and KVM deployment 5
6. Containerization 6
Lecture Plan 7. Tutorial 3 – Docker Implementation and Server Deployment 7-8
8. Container Orchestration, Kubernetes 9
9. Tutorial 4 – Kubernetes Dashboard and Server Deployment 9-10
10. Cloud Service Providers - AWS and Azure Cloud Services 11

11. Tutorial 5 – AWS Cloud 12-13


12. Tutorial 6 – Azure Cloud Services 14-15
13. Cloud Distributed Storage 16

4
 What is Cloud Computing?
 Early models of Cloud Computing.
 Delivery models and services.
Lecture  Ethical issues in Cloud Computing.
Contents  Cloud vulnerabilities.
 Parallel Computing.
 Distributed Systems.

5
 What do you think?

 “Cloud computing is an information technology (IT) paradigm that


enables ubiquitous access to shared pools of configurable system
resources and higher-level services that can be rapidly provisioned
with minimal management effort, often over the Internet.
 Cloud computing relies on sharing of resources to achieve coherence
What is Cloud and economies of scale, similar to a public utility.”
 source: https://en.wikipedia.org/wiki/cloud_computing
Computing?
 “Simply put, cloud computing is the delivery of computing services –
servers, storage, databases, networking, software, analytics and more
– over the Internet (“the cloud”).
 Companies offering these computing services are called cloud
providers and typically charge for cloud computing services based on
usage, similar to how you’re billed for gas or electricity at home.”
 source: https://azure.microsoft.com/en-gb/overview/what-is-cloud-computing/

6
Cloud
Computing
Models,
Resources,
Attributes

7
 Basic reasoning: information and data processing can
be done more efficiently on large farms of computing
and storage systems accessible via the Internet.

 Two early models:


 Grid computing – initiated by the National Labs in the early
Early Models 1990s; targeted primarily at scientific computing.
 “Grid computing is the collection of computer resources from
of Cloud multiple locations to reach a common goal. The grid can be
thought of as a distributed system with non-interactive
Computing workloads that involve a large number of files.” from Wikipedia
 Utility computing – initiated in 2005-2006 by IT companies
and targeted at enterprise computing.
 “Utility computing is a service provisioning model in which a
service provider makes computing resources and infrastructure
management available to the customer as needed, and charges
them for specific usage rather than a flat rate.” from Wikipedia

8
“Cloud Computing offers on-demand, scalable and elastic
computing (and storage services). The resources used for
these services can be metered and users are charged only
for the resources used. “ from the Book
Shared Resources and Resource Management:
1. Cloud uses a shared pool of resources
Cloud 2. Uses Internet techn. to offer scalable and elastic
computing - services.
3. The term “elastic computing” refers to the ability of
Characteristics dynamically and on-demand acquiring computing
resources and supporting a variable workload.
4. Resources are metered and users are charged
accordingly.
5. It is more cost-effective due to resource-multiplexing.
Lower costs for the cloud service provider are past to
the cloud users.

9
Data Storage:
6. Data is stored:
 in the “cloud”, in certain cases closer to the site where it is
used.
 appears to the users as if stored in a location-independent
manner.
Cloud 7. The data storage strategy can increase reliability, as
well as security, and can lower communication costs.
computing
(cont’d) Management:
8. The maintenance and security are operated by
service providers.
9. The service providers can operate more efficiently
due to specialisation and centralisation.

10
1. Resources, such as CPU cycles, storage, network
bandwidth, are shared.
2. When multiple applications share a system, their
peak demands for resources are not synchronized
thus, multiplexing leads to a higher resource
Cloud utilization.
Computing 3. Resources can be aggregated to support data-
intensive applications.
Advantages
4. Data sharing facilitates collaborative activities.
Many applications require multiple types of analysis
of shared data sets and multiple decisions carried out
by groups scattered around the globe.

11
5. Eliminates the initial investment costs for a private
computing infrastructure and the maintenance and
operation costs.
6. Cost reduction: concentration of resources creates
Cloud the opportunity to pay as you go for computing.
Computing 7. Elasticity: the ability to accommodate workloads
with very large peak-to-average ratios.
Advantages
8. User convenience: virtualization allows users to
operate in familiar environments rather than in
idiosyncratic ones.

12
1. Public Cloud
 the infrastructure is made available to the general public or a
large industry group and is owned by the organization selling
cloud services.

2. Private Cloud
 the infrastructure is operated solely for an organization.
Types of
clouds 1. Hybrid Cloud
 composition of two or more Clouds (public, private, or
community) as unique entities but bound by a standardised
technology that enables data and application portability.

2. Other types: e.g., Community/Federated Cloud


 the infrastructure is shared by several organizations and
supports a community that has shared concerns.

13
 It is in a better position to exploit recent advances in
software, networking, storage, and processor
technologies promoted by the same companies who
provide Cloud services.
Why cloud  Economical reasons: It is used for enterprise
computing is computing; its adoption by industrial organizations,
(could) be financial institutions, government, and so on has a
successful when huge impact on the economy.
other paradigms  Infrastructures Management reasons:
have failed?  A single Cloud consists of a mostly homogeneous (now more
heterogeneous) set of hardware and software resources.
 The resources are in a single administrative domain (AD).
Security, resource management, fault-tolerance, and quality
of service are less challenging than in a heterogeneous
environment with resources in multiple ADs.

14
1. Availability of service: what happens when the
service provider cannot deliver?
2. Data confidentiality and auditability, a serious
Challenges for problem.

cloud 3. Diversity of services, data organization, user


interfaces available at different service providers
computing limit user mobility; once a customer is hooked to one
provider it is hard to move to another.
4. Data transfer bottleneck; many applications are
data-intensive.

15
5. Performance unpredictability, one of the
consequences of resource sharing.
 How to use resource virtualization and performance isolation
for QoS guarantees?
 How to support elasticity, the ability to scale up and down
quickly?
6. Resource management: It is a big challenge to
More manage different workloads running on large data
centers. Are self-organization and self-management
challenges the solution?
7. Security and confidentiality: major concern for
sensitive applications, e.g., healthcare applications.

Addressing these challenges is on-going work!

16
1. Software as a Service (SaaS) (high level)
2. Platform as a Service (PaaS)
3. Infrastructure as a Service (IaaS) (low level)

Cloud Delivery
Models

source Wikipedia
17
 Infrastructure is compute resources, CPU, VMs, storage, etc.

 The user is able to deploy and run arbitrary software, which


can include operating systems and applications.
Infrastructure-  The user does not manage or control the underlying Cloud
infrastructure but has control over operating systems,
as-a-Service storage, deployed applications, and possibly limited control
of some networking components, e.g., host firewalls.
(IaaS)
 Services offered by this delivery model include:
 server hosting, storage, computing hardware, operating
systems, virtual instances, load balancing, Internet access, and
bandwidth provisioning.
 Example:
 Amazon EC2

18
 Allows a cloud user to deploy consumer-created or acquired
applications using programming languages and tools
supported by the service provider.
 The user:
 Has control over the deployed applications and, possibly,
application hosting environment configurations.
 Does not manage or control the underlying Cloud infrastructure
Platform-as-a- including network, servers, operating systems, or storage.
Service (PaaS)  Not particularly useful when:
 The application must be portable.
 Proprietary programming languages are used.
 The hardware and software must be customized to improve the
performance of the application.
 Examples:
 Google App Engine, Windows Azure

19
 Applications are supplied by the service provider.
 The user does not manage or control the underlying
Cloud infrastructure or individual application
capabilities.
 Services offered include:
 Enterprise services such as: workflow management,
Software-as-a- communications, digital signature, customer relationship
management (CRM), desktop software, financial
Service (SaaS) management, geo-spatial, and search.
 Not suitable for real-time applications or for those
where data is not allowed to be hosted externally.

 Examples:
 Gmail, Salesforce

20
The Three
delivery
models of
Cloud
Computing

21
 Service management and provisioning including:
 Virtualization.
 Service provisioning.
 Call center.
 Operations management.

Cloud activities 
Systems management.
QoS management.
 Billing and accounting, asset management.
 SLA management.
 Technical support and backups.

22
 Security management including:
 ID and authentication.
 Certification and accreditation.
 Intrusion prevention.
Cloud  Intrusion detection.
activities  Virus protection.
(cont’d)  Cryptography.
 Physical security, incident response.
 Access control, audit and trails, and firewalls.

23
 Customer services such as:
 Customer assistance and on-line help.
 Subscriptions.
 Business intelligence.
 Reporting.
Cloud activities  Customer preferences.
(cont’d)  Personalization.

 Integration services including:


 Data management.
 Development.

24
 Paradigm shift with implications on computing ethics:
 The control is relinquished to third party services.
 Data is stored on multiple sites administered by several
organizations.
 Multiple services interoperate across the network.
Ethical issues
 Implications:
 Unauthorised access.
 Data corruption.
 Infrastructure failure, and service unavailability.

25
 Systems can span the boundaries of multiple
organisations and cross the security borders.

 The complex structure of Cloud services can make it


De- difficult to determine who is responsible in case
perimeterisati something undesirable happens.
on
 Identity fraud and theft are made possible by the
unauthorized access to personal data in circulation and
by new forms of dissemination through social networks
and they could also pose a danger to Cloud Computing.

26
 Cloud service providers have already collected
petabytes of sensitive personal information stored in
data centers around the world.
 The acceptance of Cloud Computing therefore will be
determined by privacy issues addressed by these
companies and the countries where the data centers
are located.
Privacy issues
 Privacy is affected by cultural differences; some
cultures favour privacy, others emphasise community.
This leads to an ambivalent attitude towards privacy in
the Internet which is a global system.

27
 Clouds are affected by malicious attacks and failures of
the infrastructure, e.g., power failures.

 Such events can affect the Internet domain name


Cloud servers and prevent access to a Cloud or can directly
affect the Clouds:
Vulnerabilities  in 2004 an attack at Akamai caused a domain name outage and
a major blackout that affected Google, Yahoo, and other sites.
 in 2009, Google was the target of a denial of service attack
which took down Google News and Gmail for several days;
 in 2012 lightning caused a prolonged down time at Amazon.

28
 “Parallel computing is a form of computation in which
many calculations are carried out simultaneously,
operating on the principles that large problems can often
be divided into smaller ones, which are then solved
concurrently (in parallel).” Wikipedia
Back to Basics
 Hardware and software systems allow us to:
-- Parallel  Solve problems demanding resources not available
Computing on a single system.
 Reduce the time required to obtain a solution.

29
 The speedup S measures the effectiveness of
parallelisation:
S(N) = T(1) / T(N)
 T(1)  the execution time of the sequential computation.
 T(N)  the execution time when N parallel computations are
executed
Parallel
Computing –  Amdahl's Law: if α is the fraction of running time a
Amdahl’s Law sequential program spends on non-parallelisable
segments of the computation then:
S ≅ 1/ α

 This is a theoretical upper bound on the best speedup


we can get from parallelising a certain program.

30
 Collection of autonomous computers, connected through a
network and distribution software (often) called middleware
which enables computers to coordinate their activities and
to share system resources for a common goal.
 Characteristics:
1. The users perceive the system as a single, integrated
Back to Basics computing facility.

-- Distributed 2.
3.
The components are autonomous.
Scheduling and other resource management and security
systems policies are implemented by each system.
4. There are multiple points of control and multiple points of
failure.
5. The resources may not be accessible at all times.
6. Can be scaled by adding additional resources.
7. Can be designed to maintain availability even at low levels of
hardware/software/network reliability.

31
 What is Cloud Computing?
 Early models of Cloud Computing.
 Delivery models and services.
Summary  Ethical issues in Cloud Computing.
 Cloud vulnerabilities.
 Parallel Computing and Distributed Systems (brief)

32
 Create a free AWS account
References

33

You might also like