Sunteți pe pagina 1din 61

Cloud Computing Overview

1
Copyright 2011, MBL@CS.NCTU

Outline
Introduction Cloud Computing Issues Dynamic Resource Allocation and QoS Cloud Security Cloud Networking Mobile Cloud Computing Future of Cloud Computing Conclusions

2
Copyright 2011, MBL@CS.NCTU

Introduction



3
Copyright 2011, MBL@CS.NCTU

Introduction Clouds

I questioned a boy under the pine trees. My Master went herb-gathering he says: He is still somewhere on the mountain-side, So deep in the clouds I cant tell where.
Tang Poems Jia Dao Translated by Innes Herdan

On Looking for a Hermit and Not Finding Him


4
Copyright 2011, MBL@CS.NCTU

Introduction


5
Copyright 2011, MBL@CS.NCTU

Introduction Clouds

I walk to where the stream dwindles And sit watching the clouds rise up and up

Tang Poems Wang Wei Translated by Innes Herdan My Country Retreat on South Mountain
6
Copyright 2011, MBL@CS.NCTU

Introduction - Clouds

Source: L.L. Peterson and B.S. Davie, Computer Networks: A System Approach, 4th Ed., Morgan Kaufmann, 2007

7
Copyright 2011, MBL@CS.NCTU

Introduction - Clouds
central office telephone network Internet

home PC

home dial-up modem

ISP modem (e.g., AOL)

Source: J.F. Kurose and K.W. Ross, Computer Networking: A Top-Down Approach, 5th Ed., Addison-Wesley, 2010

8
Copyright 2011, MBL@CS.NCTU

Introduction Cloud Computing Origin


In August 2006, Eric Schmidt of Google CEO coined their approach to SaaS as cloud computing at a Search Engine Strategies Conference The U.S. Patent and Trademark Office has reversed course on its earlier move to grant Dell trademark rights to the term "cloud computing" Incapable of functioning as a source-identifier for applicants service Dell owns the domain cloudcomputing.com

9
Copyright 2011, MBL@CS.NCTU

Introduction Cloud Computing History


1943 IBM T.J. Watson: I think there is a world market for about five computers Gartner: 2007 PCs 264 million; Servers - 8.84 million 1983 Sun Microsystems founded: Theme - The Network is the Computer 1993 Sun Microsystems CTO Eric Schmidt: When the network becomes as fast as the processor, the computer hollows out and spreads across the network

10
Copyright 2011, MBL@CS.NCTU

Introduction Cloud Computing History


1994 Amazon.com founded 1995 Yahoo! Founded; Microsoft MSN established 1998 Google founded 1999 Saleforce.com founded 2004: Facebook is a social network service and website launched in February 2004; As of January 2011, Facebook has more than 600 million active users October 2004: Google offered Gmail service March 2006: Amazon offered Amazon S3 (Simple Storage Service) service
11
Copyright 2011, MBL@CS.NCTU

Introduction Cloud Computing History


June 2006 Microsofts Ray Ozzie: Software + Service August 2006: Eric Schmidt coined Cloud Computing for server clusters December 2006: Amazon offered Amazon EC2 (Elastic Compute Cloud) service January 2008: Saleforce offered Force.com service April 2008: Google offered Google App Engine service October 2008: Microsoft offered Window Azure
12
Copyright 2011, MBL@CS.NCTU

Introduction Fifth Utility: Computing


It has been suggested that the shift to the cloud model could make computing the fifth utility (along with water, electricity, gas, and telephone) The shift is already remaking the computer industry, bringing new competitors like Google to the fore and threatening traditional stalwarts like Microsoft and Dell

Source: Nicholas G. Carr, The big switch: rewiring the world, from Edison to Google, 2008

13
Copyright 2011, MBL@CS.NCTU

Introduction Cloud Computing Definition


Clouds: Resources or services over internet Cloud computing: Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like electricity Cloud computing characteristics: involves the provision of dynamically scalable and often virtualized resources as a service over the Internet

14
Copyright 2011, MBL@CS.NCTU

Introduction Virtualization
Virtualization is the idea of partitioning or dividing the resources of a single server into multiple segregated VMs (virtual machines) A VM is a software implementation of a machine (i.e., a computer) that executes programs like a physical machine

Source: L. Gillam et al. (eds.), Cloud Computing: Principles, Systems and Applications, Springer, 2010

15
Copyright 2011, MBL@CS.NCTU

Introduction Virtualization

Source: L. Gillam et al. (eds.), Cloud Computing: Principles, Systems and Applications, Springer, 2010

16
Copyright 2011, MBL@CS.NCTU

Introduction Mobile Phones


When smartphones combine with cloud computing, the result is the fulfillment of Bill Gates' 1990 prediction that technology would eventually put the world's information at peoples' fingertips Cray-1: 4 MB, 80 MHz, USD 5,000,000 Android (T-mobile G1): 192 MB, 528 MHz, USD 178

17
Copyright 2011, MBL@CS.NCTU

Cloud Computing Conceptual Diagram

Source: http://en.wikipedia.org/wiki/Cloud_computing

18
Copyright 2011, MBL@CS.NCTU

Cloud Computing Application Scenarios


Case 1: The Washington Post uses Amazon EC2 (using 200 virtual servers) to turn Hillary Clintons White House schedule17,481 non-searchable PDF pagesinto a searchable database within 24 hours (30 min/page 1 min/page)

19
Copyright 2011, MBL@CS.NCTU

Cloud Computing Application Scenarios


Case 2: Salesforce.com has announced that the Haagen-Dazs Shoppe Company has chosen Salesforce CRM (Customer Relationship Management) and the Force.com platform Haagen-Dazs can "identify opportunities and open franchises, as well as track staff training and ensure store quality

20
Copyright 2011, MBL@CS.NCTU

Cloud Computing Application Scenarios


Case 3: Giftag is gift registry add on for FireFox and Explorer It lets you pick things from any site, add them to a list, and share that list where ever you want It has recently been re-platformed on Google App Engine to resolve the overloading problem

21
Copyright 2011, MBL@CS.NCTU

Cloud Computing Paradigm Shift

22
Copyright 2011, MBL@CS.NCTU

Cloud Computing Trends

23
Copyright 2011, MBL@CS.NCTU

Cloud Computing Definition from NIST


Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction

24
Copyright 2011, MBL@CS.NCTU

Cloud Computing Definition from NIST


Visual Model of NISTs Working Definition of Cloud Computing
Measured Service On-Demand Self Service

Essential Characteristics

Rapid Elasticity Resource Pooling

Broad Network Access

Service Models

Software as a Service (SaaS)

Platform as a Service (PaaS)

Infrastucture as a Service (IaaS)

Deployment Models

Public

Private

Hybrid

Community

http://www.csrc.nist.gov/groups/SNS/cloud-computing/index.html
Cisco Confidential Copyright Copyright 2009 Cisco Systems, Inc. All rights reserved. 2011, MBL@CS.NCTU Internet Business Solutions Group

25

Cloud Computing Essential Characteristics


On-demand self-service: A consumer can unilaterally provision computing capabilities, such as server time and network storage, without requiring human interaction with each services provider Broad network access: Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous client platforms (e.g., mobile phones, laptops, and PDAs)

26
Copyright 2011, MBL@CS.NCTU

Cloud Computing Essential Characteristics


Resource pooling: The providers computing resources are pooled to serve multiple consumers, and virtual resources dynamically assigned and reassigned according to consumer demand Examples of resources include storage, processing, memory, network bandwidth, and virtual machines

27
Copyright 2011, MBL@CS.NCTU

Cloud Computing Essential Characteristics


Rapid elasticity: Capabilities can be rapidly and elastically provisioned, to quickly scale out and rapidly released to quickly scale in To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time

28
Copyright 2011, MBL@CS.NCTU

Cloud Computing Essential Characteristics


Measured Service: Cloud systems automatically control and optimize resource use by leveraging a metering capability Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service

29
Copyright 2011, MBL@CS.NCTU

Cloud Computing Service Models


Software as a Service (SaaS): The capability provided to the consumer is to use the providers applications running on a cloud infrastructure The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities For example, Gmail, Google Maps

30
Copyright 2011, MBL@CS.NCTU

Cloud Computing Service Models


Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications For example, Google App Engine, Window Azure

31
Copyright 2011, MBL@CS.NCTU

Cloud Computing Service Models


Infrastructure as a Service (IaaS): The capability provided to the consumer is to provision processing, storage, networks, where the consumer is able to deploy and run arbitrary software, which can include OSs and applications The consumer does not manage or control the underlying cloud infrastructure but has control over OSs, storage, deployed applications For example, Amazon EC2, hiCloud CaaS

32
Copyright 2011, MBL@CS.NCTU

Cloud Computing Deployment Models

Source: http://en.wikipedia.org/wiki/Cloud_computing

33
Copyright 2011, MBL@CS.NCTU

Cloud Computing System Guarantees


The CAP theorem states that it is impossible for a distributed computer system to simultaneously provide all three of the following guarantees (Eric Brewer, UC Berkeley, 2000): Consistency (all nodes see the same data at the same time) Availability (node failures do not prevent survivors from continuing to operate) Tolerance to Network Partitions (the system continues to operate during the network split )

34
Copyright 2011, MBL@CS.NCTU

Cloud Computing System Guarantees


According to the theorem, a distributed system can satisfy any two of these three guarantees at the same time, but not all three Cloud computing focuses on Availability and Tolerance to Network Partitions (and Eventual Consistency - will be synchronized later) Therefore, the bank transaction system that needs Consistence is not suitable to be in the cloud environment

35
Copyright 2011, MBL@CS.NCTU

Cloud Computing Research Activities


In October 2007, IBM and Google announced a multi-university project, Academic Cloud Computing Initiative (ACCI), designed to enhance students' technical knowledge to address the challenges of cloud computing Government: In April 2009, the National Science Foundation joined the ACCI and awarded approximately $5 million in grants to 14 academic institutions

36
Copyright 2011, MBL@CS.NCTU

Cloud Computing Activities in Taiwan


Taiwan companies are always on the lookout for the next big thing and they're taking a stab at cloud computing The Taiwan Cloud Computing Consortium (TCCC) was established back in April, 2010 The TCCC is a co-operation between Industrial Technology Research Institute (ITRI) and over 60 local Taiwanese technology companies

37
Copyright 2011, MBL@CS.NCTU

Cloud Computing Activities in Taiwan


Taiwan's government is throwing its hat into the cloud computing ring (9/9/2010) The government recently announced plans to invest US$744 million (NT$ 24 billion) to develop cloud computing technology and services during the next five years Taiwan's government predicts the global cloud computing sector to be worth US$31 billion by 2014

38
Copyright 2011, MBL@CS.NCTU

Cloud Computing Activities in Taiwan


We should take advantage of Taiwans strong information and communications technology industry, further upgrading it in order to seize business opportunities involving cloud computing technology, Premier Den-yih Wu said in a press conference in April, 2010

39
Copyright 2011, MBL@CS.NCTU

Cloud Computing Critics


Larry Ellison, CEO of Oracle Corporation has stated that cloud computing has been defined as "everything that we already do" and that it will have no effect except to "change the wording on some of our ads Oracle Corporation has since launched a cloud computing center and worldwide tour Forrester Research Principal Analyst John Rymer dismisses Ellison's remarks by stating that his "comments are complete nonsense and he knows it"
40
Copyright 2011, MBL@CS.NCTU

Cloud Computing Critics


Richard Stallman said that cloud computing was simply a trap aimed at forcing more people to buy into locked, proprietary systems that would cost them more and more over time "It's stupidity; It's worse than stupidity; it's a marketing hype campaign, he told The Guardian October 1985, he founded the Free Software Foundation

41
Copyright 2011, MBL@CS.NCTU

Dynamic Resource Allocation and QoS


To perform dynamic resource allocation, a cloud employs three components: A monitoring module that measures the workload and the performance metric of each application A prediction module that uses the measurements from the monitoring module to estimate the future workload An allocation module that uses these workload estimates to determine resource shares such that QoS (or SLA) of each application is met
42
Copyright 2011, MBL@CS.NCTU

Dynamic Resource Allocation and QoS


Achieve dynamic load balancing and optimal resource utilization (for cost effectiveness and energy efficiency of service providers) in the datacenter (cloud) by enabling the creation of logical resource pools that are abstracted away from the physical hardware Virtual machines are then dynamically placed on the most optimal hardware to ensure service level agreements (SLAs) are met (for user satisfactions) (Source: VMware)

43
Copyright 2011, MBL@CS.NCTU

Cloud Security
Data Protection Data from one customer must be properly segregated from that of another Identity Management Cloud providers either integrate the customers identity management system into their own infrastructure, or provide an identity management solution of their own

44
Copyright 2011, MBL@CS.NCTU

Cloud Security
Physical and Personal Security Providers ensure that physical machines are adequately secure and that access to these machines as well as all relevant customer data is not only restricted but that access is documented Application Security Cloud providers ensure that applications available as a service via the cloud are secure

45
Copyright 2011, MBL@CS.NCTU

Cloud Security
Privacy Providers ensure that all critical data (credit card numbers, for example) are masked and that only authorized users have access to data in its entirety

46
Copyright 2011, MBL@CS.NCTU

Cloud Networking
Current data centers follow a common network architecture, known as the three-tier architecture At the bottom level, known as the access tier, each server connects to one (or two, for redundancy purposes) access switch Each access switch connects to one (or two) switches at the aggregation tier Finally, each aggregation switch connects with multiple switches at the core tier

47
Copyright 2011, MBL@CS.NCTU

Cloud Networking
Figure 4 shows a layer-2 topology with 16 servers and one VLAN (labeled as Tree) Scaling the three-tier architecture is achieved by scaling up each individual switch, i.e. by increasing its fan-out, rather than scaling out the topology itself For example, the core tier can accommodate 8 switches at most

48
Copyright 2011, MBL@CS.NCTU

Cloud Networking [8]

49
Copyright 2011, MBL@CS.NCTU

Cloud Networking
VL2 is a new architecture that shares many features with the tree It is a 3-tier architecture with main difference that the core tier and the aggregation tier form a Clos topology, i.e. the aggregation switches are connected with the core ones by forming a complete bipartite graph

50
Copyright 2011, MBL@CS.NCTU

Cloud Networking
PortLand (Fat-Tree) is another three-tier architecture that shares with the VL2 the same Clos topology feature, though at different levels The PortLand architecture makes use of fat-tree topologies and it is built around the concept of pods: a collection of access and aggregation switches that form a complete bipartite graph, i.e., a Clos graph

51
Copyright 2011, MBL@CS.NCTU

Cloud Networking
BCube is a new multi-level network architecture for the data center with the following distinguishing feature Servers are part of the network infrastructure, i.e., they forward packets on behalf of other servers

52
Copyright 2011, MBL@CS.NCTU

Mobile Cloud Computing


The most hype technology trend of the past year: either cloud computing or smartphones and tablets Cloud Computing drives mobile data growth Mobile data to increase 14-fold by 2014, much of it in the cloud

53
Copyright 2011, MBL@CS.NCTU

Future of Cloud Computing


Microsofts Cloud Computing Futures (CCF): focused on reducing the power consumption and operation cost of data centers, and increasing their adaptability and resilience to failures An intelligent closed-loop control system can determine when to put a processor to sleep and when to awaken it to serve the workload

54
Copyright 2011, MBL@CS.NCTU

Conclusions
Cloud computing is a powerful way to provide scalable on-demand computing resources Virtualization technology is foundational to cloud computing because it provides a safe and flexible platform Gartner predicts that by 2012, 80 percent of Fortune 1000 enterprises will be paying for some cloud computing services, and 30 percent will be paying for cloud computing infrastructure services

55
Copyright 2011, MBL@CS.NCTU

Conclusions
Efficient dynamic resource allocation with QoSawareness and in cloud computing we trust (secure cloud computing) are keys to success and spread of cloud computing Redesigning scalable data center networks is driven by the desire to reduce cost while simultaneously handling an ever-increasing amount of the traffic between servers

56
Copyright 2011, MBL@CS.NCTU

Conclusions
The smartphone, equipped with gaming, social networking, photography, health, banking & payments, learning, productivity, is fueling the mobile phone industry growth Mobile Cloud Computing will definitely leverage the mobile handsets to the level of Super Duper Smart

57
Copyright 2011, MBL@CS.NCTU

Conclusions

Every cloud has a silver lining In every bad situation there is an element of good

58
Copyright 2011, MBL@CS.NCTU

References
[1] http://en.wikipedia.org/wiki/Cloud_computing [2] http://www.csrc.nist.gov/groups/SNS/cloudcomputing/index.html [3] Peter Mell and Tim Grance, http://csrc.nist.gov/groups/SNS/cloudcomputing/cloud-def-v15.doc [3] Ying Chen et al., Cloud Computing Strategy (in Chinese), CommonWealth, 2010 [4] L. Gillam et al. (eds.), Cloud Computing: Principles, Systems and Applications, Springer, 2010 [5]BP, , 2010 59
Copyright 2011, MBL@CS.NCTU

References
[6] A. Chandra, W. Gong and P. Shenoy, Shenoy, Dynamic Resource Allocation for Shared Data Centers Using Online Measurements, ACM SIGMETRICS03, pp. 300300-301, June 2003 [7] http://en.wikipedia.org/wiki/Cloud_computing_security [8] X. Meng, Meng, V. Pappas, and L. Zhang, Improving the Scalability of Data Center Networks with TrafficTraffic-aware Virtual Machine Placement, IEEE INFOCOM, 2010 [9] http://itmanagement.earthweb.com/netsys/print.php/ 3922856 [10] http://shahneil.com/2010/03/cloudshttp://shahneil.com/2010/03/clouds-smartphonessmartphonesrainmaking/ 60
Copyright 2011, MBL@CS.NCTU

Thank you Q&A


61
Copyright 2011, MBL@CS.NCTU

S-ar putea să vă placă și