L1 Basic Concepts
L1 Basic Concepts
L1 Basic Concepts
Concepts
Lecture 1
Google Classroom for
CS451 Cloud Computing Online Experience
Muhammad Yasir Khan
Over 19 years teaching experience to students of more than
15 countries
My Taught Cisco based Networking, System Administration and
Background Cyber Security courses for more than 9 years in Gulf
Cisco Network Academy Instructor
and Contact
Details Computer Science Department
[email protected]
http://om.linkedin.com/in/myasir
Resources:
“Essentials of Cloud Computing”, K. Chandrasekaran, CRC,
2015
“Cloud Computing, Theory and Practice 2nd Edition”, Dan C.
Marinescu, Morgan Kaufmann, 2018
3
Topic Week #
1. Introduction 1
2. Cloud Service Model and Types of Clouds 2
3. Virtualization (Type 1 and Type 2) 3-4
4. Tutorial 1 – Installation and deployment of VMWare Workstation 4
5. Tutorial 2 – ESXi Server and KVM deployment 5
6. Containerization 6
Lecture Plan 7. Tutorial 3 – Docker Implementation and Server Deployment 7-8
8. Container Orchestration, Kubernetes 9
9. Tutorial 4 – Kubernetes Dashboard and Server Deployment 9-10
10. Cloud Service Providers - AWS and Azure Cloud Services 11
4
What is Cloud Computing?
Early models of Cloud Computing.
Delivery models and services.
Lecture Ethical issues in Cloud Computing.
Contents Cloud vulnerabilities.
Parallel Computing.
Distributed Systems.
5
What do you think?
6
Cloud
Computing
Models,
Resources,
Attributes
7
Basic reasoning: information and data processing can
be done more efficiently on large farms of computing
and storage systems accessible via the Internet.
8
“Cloud Computing offers on-demand, scalable and elastic
computing (and storage services). The resources used for
these services can be metered and users are charged only
for the resources used. “ from the Book
Shared Resources and Resource Management:
1. Cloud uses a shared pool of resources
Cloud 2. Uses Internet techn. to offer scalable and elastic
computing - services.
3. The term “elastic computing” refers to the ability of
Characteristics dynamically and on-demand acquiring computing
resources and supporting a variable workload.
4. Resources are metered and users are charged
accordingly.
5. It is more cost-effective due to resource-multiplexing.
Lower costs for the cloud service provider are past to
the cloud users.
9
Data Storage:
6. Data is stored:
in the “cloud”, in certain cases closer to the site where it is
used.
appears to the users as if stored in a location-independent
manner.
Cloud 7. The data storage strategy can increase reliability, as
well as security, and can lower communication costs.
computing
(cont’d) Management:
8. The maintenance and security are operated by
service providers.
9. The service providers can operate more efficiently
due to specialisation and centralisation.
10
1. Resources, such as CPU cycles, storage, network
bandwidth, are shared.
2. When multiple applications share a system, their
peak demands for resources are not synchronized
thus, multiplexing leads to a higher resource
Cloud utilization.
Computing 3. Resources can be aggregated to support data-
intensive applications.
Advantages
4. Data sharing facilitates collaborative activities.
Many applications require multiple types of analysis
of shared data sets and multiple decisions carried out
by groups scattered around the globe.
11
5. Eliminates the initial investment costs for a private
computing infrastructure and the maintenance and
operation costs.
6. Cost reduction: concentration of resources creates
Cloud the opportunity to pay as you go for computing.
Computing 7. Elasticity: the ability to accommodate workloads
with very large peak-to-average ratios.
Advantages
8. User convenience: virtualization allows users to
operate in familiar environments rather than in
idiosyncratic ones.
12
1. Public Cloud
the infrastructure is made available to the general public or a
large industry group and is owned by the organization selling
cloud services.
2. Private Cloud
the infrastructure is operated solely for an organization.
Types of
clouds 1. Hybrid Cloud
composition of two or more Clouds (public, private, or
community) as unique entities but bound by a standardised
technology that enables data and application portability.
13
It is in a better position to exploit recent advances in
software, networking, storage, and processor
technologies promoted by the same companies who
provide Cloud services.
Why cloud Economical reasons: It is used for enterprise
computing is computing; its adoption by industrial organizations,
(could) be financial institutions, government, and so on has a
successful when huge impact on the economy.
other paradigms Infrastructures Management reasons:
have failed? A single Cloud consists of a mostly homogeneous (now more
heterogeneous) set of hardware and software resources.
The resources are in a single administrative domain (AD).
Security, resource management, fault-tolerance, and quality
of service are less challenging than in a heterogeneous
environment with resources in multiple ADs.
14
1. Availability of service: what happens when the
service provider cannot deliver?
2. Data confidentiality and auditability, a serious
Challenges for problem.
15
5. Performance unpredictability, one of the
consequences of resource sharing.
How to use resource virtualization and performance isolation
for QoS guarantees?
How to support elasticity, the ability to scale up and down
quickly?
6. Resource management: It is a big challenge to
More manage different workloads running on large data
centers. Are self-organization and self-management
challenges the solution?
7. Security and confidentiality: major concern for
sensitive applications, e.g., healthcare applications.
16
1. Software as a Service (SaaS) (high level)
2. Platform as a Service (PaaS)
3. Infrastructure as a Service (IaaS) (low level)
Cloud Delivery
Models
source Wikipedia
17
Infrastructure is compute resources, CPU, VMs, storage, etc.
18
Allows a cloud user to deploy consumer-created or acquired
applications using programming languages and tools
supported by the service provider.
The user:
Has control over the deployed applications and, possibly,
application hosting environment configurations.
Does not manage or control the underlying Cloud infrastructure
Platform-as-a- including network, servers, operating systems, or storage.
Service (PaaS) Not particularly useful when:
The application must be portable.
Proprietary programming languages are used.
The hardware and software must be customized to improve the
performance of the application.
Examples:
Google App Engine, Windows Azure
19
Applications are supplied by the service provider.
The user does not manage or control the underlying
Cloud infrastructure or individual application
capabilities.
Services offered include:
Enterprise services such as: workflow management,
Software-as-a- communications, digital signature, customer relationship
management (CRM), desktop software, financial
Service (SaaS) management, geo-spatial, and search.
Not suitable for real-time applications or for those
where data is not allowed to be hosted externally.
Examples:
Gmail, Salesforce
20
The Three
delivery
models of
Cloud
Computing
21
Service management and provisioning including:
Virtualization.
Service provisioning.
Call center.
Operations management.
Cloud activities
Systems management.
QoS management.
Billing and accounting, asset management.
SLA management.
Technical support and backups.
22
Security management including:
ID and authentication.
Certification and accreditation.
Intrusion prevention.
Cloud Intrusion detection.
activities Virus protection.
(cont’d) Cryptography.
Physical security, incident response.
Access control, audit and trails, and firewalls.
23
Customer services such as:
Customer assistance and on-line help.
Subscriptions.
Business intelligence.
Reporting.
Cloud activities Customer preferences.
(cont’d) Personalization.
24
Paradigm shift with implications on computing ethics:
The control is relinquished to third party services.
Data is stored on multiple sites administered by several
organizations.
Multiple services interoperate across the network.
Ethical issues
Implications:
Unauthorised access.
Data corruption.
Infrastructure failure, and service unavailability.
25
Systems can span the boundaries of multiple
organisations and cross the security borders.
26
Cloud service providers have already collected
petabytes of sensitive personal information stored in
data centers around the world.
The acceptance of Cloud Computing therefore will be
determined by privacy issues addressed by these
companies and the countries where the data centers
are located.
Privacy issues
Privacy is affected by cultural differences; some
cultures favour privacy, others emphasise community.
This leads to an ambivalent attitude towards privacy in
the Internet which is a global system.
27
Clouds are affected by malicious attacks and failures of
the infrastructure, e.g., power failures.
28
“Parallel computing is a form of computation in which
many calculations are carried out simultaneously,
operating on the principles that large problems can often
be divided into smaller ones, which are then solved
concurrently (in parallel).” Wikipedia
Back to Basics
Hardware and software systems allow us to:
-- Parallel Solve problems demanding resources not available
Computing on a single system.
Reduce the time required to obtain a solution.
29
The speedup S measures the effectiveness of
parallelisation:
S(N) = T(1) / T(N)
T(1) the execution time of the sequential computation.
T(N) the execution time when N parallel computations are
executed
Parallel
Computing – Amdahl's Law: if α is the fraction of running time a
Amdahl’s Law sequential program spends on non-parallelisable
segments of the computation then:
S ≅ 1/ α
30
Collection of autonomous computers, connected through a
network and distribution software (often) called middleware
which enables computers to coordinate their activities and
to share system resources for a common goal.
Characteristics:
1. The users perceive the system as a single, integrated
Back to Basics computing facility.
-- Distributed 2.
3.
The components are autonomous.
Scheduling and other resource management and security
systems policies are implemented by each system.
4. There are multiple points of control and multiple points of
failure.
5. The resources may not be accessible at all times.
6. Can be scaled by adding additional resources.
7. Can be designed to maintain availability even at low levels of
hardware/software/network reliability.
31
What is Cloud Computing?
Early models of Cloud Computing.
Delivery models and services.
Summary Ethical issues in Cloud Computing.
Cloud vulnerabilities.
Parallel Computing and Distributed Systems (brief)
32
Create a free AWS account
References
33