Cloud Computing: Mendel University in Brno
Cloud Computing: Mendel University in Brno
Cloud Computing: Mendel University in Brno
Cloud
Computing
Written by: echov, Hanka
Grepl, Michal
Jindra, Martin
Oborov, Marica
1 Introduction
This text provides you with a basic information about the Cloud
Computing, a new and fastly growing term. It is structured to seven
chapters for better orientation and easy understanding. The first chapter
talks about the very basis such as definition, its attributes or history.
1.1 Definition
Cloud Computing is a buzzword of 2010 and many experts disagree on its
exact definition. But the most used one and concurred one includes the
notion of webbased services which are available on demand from and
optimized and highly scalable service provider. Since such a disagreement
on the definition, one will be provided to better understand of the notion.
The cloud is IT as a service, delivered by IT resources that are independent
of location. It is a style of computing in which dynamically scalable and
often virtualized resources are provided as a service over the Internet
where endusers have no knowledge of, expertise in, or control over the
technology infrastructure (the cloud) that supports them. [1]
1.2 Attributes
Before some of the attributes will be defined, the term cloud should be
explained. A cloud has been long used in IT, in network diagrams
respectively, to represent a sort of black box where the interfaces are well
known but the internal routing and processing is not visible to the network
users. Key attributes in cloud computing:
1.3 History
History of Cloud Computing surprisingly began almost 50 years ago. The
father of this idea is considered to be John McCarthy, a professor at MIT
University in US, who first in 1961 presented the idea of sharing the same
computer technology as being the same as for example sharing electricity.
Electrical power needs many households/firms that possess a variety of
electrical appliances but do not possess power plant. One power plant
serves many customers and using the electricity example, power
plant=service
provider,
distribution
network=internet
and
the
households/firms=computers. [3]
Since that time, Cloud computing has evolved through a number of phases
which include grid and utility computing, application service provision
(ASP), and Software as a Service (SaaS). One of the first milestones was
the arrival of Salesforce.com in 1999, which pioneered the concept of
delivering enterprise applications via a simple website. The next
development was Amazon Web Services in 2002, which provided a suite of
cloudbased services including storage, computation and even human
intelligence. Another big milestone came in 2009 as Google and others
started to offer browserbased enterprise applications, though services
such as Google Apps. [4]
2 Architecture
A basis infromation about the architecture is provided in this chapter,
together with the explanations of relevant terms such as virtualization,
Frond/Back end or Middleware.
The Cloud Computing architecture can be divided into two sections, the
front end and the back end, connected together through a network,
usually Internet. The Front End includes the client's computer and the
application required to access the cloud computing system. Not all cloud
computing systems have the same user interface. Services like Webbased
email programs leverage existing Web browsers like Internet Explorer or
Firefox. Other systems have unique applications that provide network
access to clients.
Private/Public cloud
Source: http://www.technologyevaluation.com/login.aspx?returnURL=http://www.technologyevaluation.com
%2fresearch%2farticles%2fi-want-my-private-cloud-21964%2f
serviceoriented
4 Intergration
Once the definition, categories and componencts needed for the users
solution have been identified the next challenge is to determine how to
put them all together. This chapter provides information about the Cloud
Computing degisn and integrability as well as gives some examples.
Enterprise to cloud
Remote to cloud
Remote to enterprise
Cloud to cloud
Cloud to enterprise
Once you put these together into a high level connectivity diagram you
can then proceed to the next step of identifying and selecting connectivity
options. Unless the systems are connected they cannot operate, at least
for any extended periods of time. It the case of cloud computing, data and
processing are both highly distributed making reliable, efficient and secure
connectivity and are the most critical.
4.2 Examples
Most common public known examples of a Cloud are Google Apps. This
service provide number of online applications like Wordprocessor,
Application for creating and editing presentations, documents storage and
sharing, email functions with connection on MS Outlook or MS exchange
services, account and contacts sharing, Instant Messenger functions, etc.,
all provided by Google. Other Clouds examples include CloudX Technology
Group, Yahoo, Ebay, Facebook, Citric XennApp, AJAX, etc.
Device using CC
Chromebook by Acer
Source: http://gearburn.com/2011/05/chromebook-awesome-if-it-wasn%E2%80%99t-from-google/
5.1 Pros
5.2 Cons
6 Operation
After reading through this chapter you will understand the terms such as
administration, support or monitoring.
Example of KPIs
Source: http://mkhairul.sembangprogramming.com/2008/04/24/key-performance-indicators-kpi-for-softwaredevelopment/
Service operation is the core of the ITIL model. Its focus is on the
day-to-day operations that are required in order to deliver service to
its users at the agreed levels of availability, reliability and
performance. It includes concepts such as event management,
incident management, problem management, access management,
request fulfillment and service desk.
6.2 Administration
Since Cloud Computing is primarily web-based, the logical interface for
administering is a portal. It can offer facilities such as billing, analytic,
account
management,
service
management,
package
install,
configuration, instance flexing and tracing problems and incidents.
The area between service request and more extensive change
management is not always obvious and depends to a large extent on the
organization involved. However, in all companies there are likely to be
services that are too critical for automated change requests.
One major recurring change is the need to perform upgrades to increase
functionality, solve problems and sometimes improve performance. New
version can disrupt services because they may drop functions, implement
them differently or contain undiscovered bugs. It is therefore important to
understand whether they will have any impact on business processes
before rolling them out live. One approach is to stage all services locally
and test them with on-premise equipment before overwriting the
production services.
Long-term capacity management is less critical for on-demand services.
Elasticity of resources means that enterprises can scale up and down as
demand dictates without need for extensive planning. Its also a good idea
to verify that your services provider will actually be in a position to deliver
all the resource requirements that you anticipate. Several aspects of
capacity planning have to be evaluated in parallel.
We will discuss the following major IAM functions that are essential for
successful and effective management of identities in the cloud:
Identity provisioning/deprovisioning
Authentication
Federation
6.3 Monitoring
Part of the incentive of moving to a public cloud is to reduce the amount of
internal operational activity. Much of the internal infrastructure is local
such as the printers, scanners and local equipment. End user desktops and
mobile device s are also closer to on-site operations personnel. One area
that is of particular concern to business continuity is backup. Backups are
required for a variety of reasons including:
6.4 Support
There is some diversity in the user roles that may require assistance in a
cloud solution. There are two types: end user and IT support. End-user
support should progress in tiers that successively address more difficult
and less common problems. It begins with simple documentation and online help to orient the user and clarify any obvious points of confusion. A
self-service portal can then help to trigger automatic process to fulfill
common requests.
In addition to end users there is also a requirement for IT and business
users to receive assistance from the service providers. There must be
mechanism in place for obtaining and sharing documentation and training
on all cloud services and technologies. Vendor architecture diagrams and
specifications for all technical interfaces can help IT staff.
6.5 Control
Most of the legal provisions that relate to cloud computing fall into one of
three categories:
Data privacy
Electronic discovery
Notification
There are also threats connected such as data leakage, data loss, noncompliance, loss of service and impairment of service
7 Conclusion
From the text and infromation aforementioned, you should have a basis
information about what is Cloud Computing and its history, features or
architecture. To summarize it, Cloud Computing is very new and modern
technology based on sharing resources (especially software, hardware and
infrastructure). It helps companies but also individuals in saving costs for
IT resources. All data are stored outofcompany at a providers place which
brings both advantages and disadbvnatges especially problematic issue
about security and data privacy. Most common Cloud service you as a user
may come across with are Google Apps.
Sources
[1] RHOTON, J, Cloud Computing Explained. 2.edition, Kent: Recursive Limited,
2011. 508 p. ISBN
9780956355607
[2] GARTNER NEWSROOM. Gartner Highlights Five Attributes of Cloud Computing.
[online]. 2009. [cit.
20110508]. Accessible at: <http://www.gartner.com/it/page.jsp?id=1035013>
[3] BUSINESSVIZE. Co je to Cloud computing a pro se o nm mluv . [online].
2010. [cit. 20110509].
Accessible at: <http://www.businessvize.cz/software/cojetocloudcomputinga
procseonemmluvi>
[4] COMPUTERWEEKLY.COM. A history of cloud computing. [online]. 2009. [cit.
20110508].
Accessible at: http://www.computerweekly.com/Articles/2009/06/10/235429/A
historyofcloudcomputing.
htm>
[5] MODCOMP. Virtualization & Cloud Computing. [online]. 2011. [cit. 201105
09]. Accessible at:
<http://www.modcomp.com/itsolutionsvirtualizationcloudcomputing>
[6]HOW STUFF WORKS. How Cloud Computing Works. [online]. 2011. [cit. 2011
0510]. Accessible at:
<http://computer.howstuffworks.com/cloudcomputing1.htm>
[7] SLIDE SHARE. Cloud computing. [online]. 2011. [cit. 20110509]. Accessible
at:
<http://en.wikipedia.org/wiki/Cloud_computing#cite_note54>
[8] SEARCH CLOUD COMPUTING.COM. Infrastructure as a Service (IaaS). [online].
2009. [cit. 201105
10]. Accessible at:
<http://searchcloudcomputing.techtarget.com/definition/Infrastructureasa
ServiceIaaS>
[9] SEARCH CLOUD COMPUTING.COM. Software as a Service (SaaS). [online].
2006. [cit. 20110510].
Accessible at: <http://searchcloudcomputing.techtarget.com/definition/Software
asaService>
[10] SEARCH CLOUD COMPUTING.COM. Platform as a Service (PaaS). [online].
2008. [cit. 201105
10]. Accessible at:
<http://searchcloudcomputing.techtarget.com/definition/PlatformasaService
PaaS>
[11] WISEGEEK. What is Cryptography. [online]. 2011. [cit. 20110508].
Accessible at:
<http://www.wisegeek.com/whatiscryptography.htm>
[12] WIKIPEDIA. Cloud Computing Manifesto. [online]. 2010. [cit. 20110509].
Accesiible at:
<http://en.wikipedia.org/wikiCloud_Computing_Manifesto>
[13] WIKIPEDIA. Cloud Computing. [online]. 2010. [cit. 20110509]. Accesiible at:
<http://en.wikipedia.org/wiki/Cloud_computing>
[14] WIKIPEDIA. Chromebook. [online]. 2010. [cit. 20110509]. Accesiible at:
<http://en.wikipedia.org/wiki/Chromebook>
[15] Cloud Security Alliance. Security Guyance for Critical Area sof Focus in
CLoud Computing V2.1
[online]. 2009. [cit. 20110509]. Accessible at:
<http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf>