Cloud Computing ก ก ก
SERVER 101 COMPUTE MEMORY DISK NETWORK
SERVER 101 1 GHz = 1,000.000.000 Cycle/Second 1 CPU CYCLE
VIRTUALIZATION 101
VIRTUALIZATION 101
VIRTUALIZATION 101
HISTORY
YEAR 1800
YEARS LATER
INNOVATION
BUSINESS OPPORTUNITIES
KNOWLEDGES CREATIVITY MANAGEMENT
NEW OPPORTUNITIES BEGIN
STAY CONNECTED MOBILITY MASSIVE STORAGE UNLIMITED COMPUTATION HIGH QUALITY SERVICES SECURE AND PAY AS YOU USE
CLOUD COMPUTING IF YOU ONLY NEED MILK WOULD YOU BUY A COW?
LONG JOURNEY OF VIRTUAL MACHINE
PERSONAL COMPUTER By the early 1970s, people in academic or research institutions had the opportunity for single-person use of a computer system in interactive mode for extended durations, although these systems would still have been too expensive to be owned by a single person. The introduction of the microprocessor, a single chip with all the circuitry that formerly occupied large cabinets, led to the proliferation of personal computers. Early personal computers - generally called microcomputers - were sold often in Electronic kit form and in limited volumes, and were of interest mostly to hobbyists and technicians. Minimal programming was done by toggle switches, and output was provided by front panel indicators. Practical uae required peripherals such as keyboards, computer terminals, disk drives, and printers.
DATA CENTERS AROUND THE WORLD HAD AN AVERAGE SERVER CPU UTILIZATION RATE OF ONLY 15%
THE HISTORY OF CLUSTER Consequently the history of early computer clusters is more or less directly tied into the history of early networks, as one of the primary motivation for the development of a network was to link computing resources, creating a de facto computer cluster. Packet switching networks were conceptually invented by the RAND corporation in 1962.. Using the concept of a packet switched network, the ARPANET project succeeded in creating in 1969 what was arguably the world's first commodity-network based computer cluster by linking four different computer centers (each of which was something of a "cluster" in its own right, but probably not a commodity cluster). The first commercial clustering product was ARCnet, developed by Datapoint in 1977.. ARCnet was not a commercial success and clustering per se did not really take off until DEC released their VAX cluster product in 1984 for the VAX/VMS operating system. The ARCnet and VAX cluster products not only supported parallel computing, but also shared file systems and peripheral devices. The idea was to provide the advantages of parallel processing, while maintaining data reliability and uniqueness. VAX cluster, now VMS cluster, is still available on OpenVMS systems from HP running on Alpha and Itanium systems.
Grids are usually computer clusters, but more focused on throughput like a computing utility rather than running fewer, tightly-coupled jobs. Often, grids will incorporate heterogeneous collections of computers, possibly distributed geographically, sometimes administered by unrelated organizations. Grid computing is optimized for workloads which consist of many independent jobs or packets of work, which do not have to share data between the jobs during the computation process. Grids serve to manage the allocation of jobs to computers which will perform the work independently of the rest of the grid cluster. Resources such as storage may be shared by all the nodes, but intermediate results of one job do not affect other jobs in progress on other nodes of the grid.
Operating system (OS) virtualization (sometimes called containers) runs on top of an existing host operating system and Provides a set of libraries that applications interact with, giving an application the illusion that it is running on a machine dedicated to its use. This approach to virtualization is extremely useful if you want to offer a similar set of operating system functionalities to a number of different user populations while using only a single machine.
the virtualization software (usually referred to as a hypervisor) presents an emulated hardware environment that guest operating systems operate upon. This emulated hardware environment is typically referred to as a virtual machine monitor or VMM. The hypervisor, which resides between the VMM and the physical hardware, translates the calls from the VMM to the specific resources of the physical machine.
Cloud Computing is a style of computing in which dynamically Scalable and often virtualized resources are provided as a service over the internet. Users need not have knowledge of, expertise in, or control over the technology in the cloud wikipedia
Eucalyptus is an open-source infrastructure for the implementation of cloud computing on computer clusters. Its name is an acronym for "Elastic Utility Computing Architecture for Linking Your Programs To Useful Systems". The current interface is compatible with Amazon Web Services cloud computing interface. Eucalyptus is available as a source package, RPM, and a Rocks disk image. Since the beta, it is also shipped with Ubuntu 9.04 as default cloud computing tool..
The Globus Toolkit is an open source software toolkit used for building grids. It is being developed by the Globus Alliance and many others all over the world. Nimbus is an open source toolkit that allows you to turn your cluster into an Infrastructure-as-a-Service (IaaS) cloud.
IBM CloudBurst supports workloads to simplify cloud computing acquisition and deployment. It s a prepackaged and selfcontained service delivery platform that can be implemented in a data center.
GOVERNMENT CHALLENGES BUILDING UP NEW ERA OF INFORMATION INFRASTRUCTURE TO OVERCOME CLOUD COMPUTING SECURITY ISSUES
2 KEY AREAS INFORMATION INFRASTRUCTURE SHIFTS 1 TRADITIONAL INFRASTRUCTURE CLOUD COMPUTING INFRASTRUCTURE 2 SECURITY CHANGES?
INFORMATION INFRASTRUCTURE COMPONENTS NO MATTER HOW COMPLEX OF THE TOPOLOGIES ARE COMPUTE STORAGE NETWORK ACCESS POINT PEOPLE TRANSFERED DATA COMPUTE AND STORAGE ARE LINKED WITH THE NETWORK AND PROVIDE SERVICES AND ACCESSES THROUGH THE NETWORK
TRADITIONAL INFORMATION INFRASTRUCTURE RUNNING ON PHYSICAL SERVERS AND NETWORK PROPRIETARY, CUSTOMIZED ECONOMY OF SCALE FULL CONTROL MOST SECURE LIMITED CAPACITY DEDICATED
MODERN INFORMATION INFRASTRUCTURE WHOLE OR PARTLY VIRTUALIZED DATA CENTER HYPERVISOR ARE IMPLEMENTED AND AT LEAST ONE SERVICE ENDPOINT BECOMES A MANAGEMENT INTERFACE THROUGH HTTPS HTTPS VIRTUAL SERVERS AND VIRTUAL APPLIANCES ARE IMPLEMENTED ON ONE OR MANY PHYSICAL SERVERS AND STORAGE CLUSTERS BUT EVERYTHING IS STILL ON PREMISE PICTURES FROM DEPARTMENT OF RURAL ROADS (DRR) VMWARE PRIVATE CLOUD, THAILAND.
MODERN INFORMATION INFRASTRUCTURE FROM VIRTUALIZED DATA CENTER TO PRIVATE CLOUD VMWARE PLATFORM VSPHERE VCLOUD DIRECTOR VSHIELD VCENTER ORCHESTRATOR VCENTER CHARGE BACK MICROSOFT HYPER-V PLATFORM HYPER-V SYSTEM CENTER VIRTUAL MACHINE MANAGER DYNAMIC DATA CENTER TOOLKITS FOR HOSTER UBUNTU ENTERPRISE CLOUD PLATFORM UBUNTU ENTERPRISE CLOUD (EUCALYPTUS) UBUNTU LANDSCAPE OR MAKE-IT-YOURSELF PLATFORM
PRIVATE CLOUD INFRASTRUCTURE NEW FORM FACTOR DATA CENTER (CLOUD READY) AZURE CLOUD APPLIANCE BUY IT, GET DELIVERED AND POWER ON SUN BLACK BOX
PUBLIC CLOUD COMPUTING INFRASTRUCTURE RESOURCES ARE VIRTUALIZED AND SHARED WITH OTHERS MOVE BOTH COMPUTE AND STORAGE ONTO THE PUBLIC CLOUD 5 CHARACTERISTICS OF CLOUD SHARED RESOURCES PAY AS YOU GO LARGE AMOUNT OF SERVERS FLEXIBILITY AND ELASTICITY SELF PROVISIONING
HYBRID CLOUD COMPUTING INFRASTRUCTURE OR MOVE A PART ONTO THE CLOUD SERVICE ENDPOINT
SECURITY WHAT ARE WE PROTECTING? CIA TRIAD CONFIDENTIALITY INTRIGRITY AVAILABILITY
VARIOUS SOLUTIONS FOR SECURITY IN THE CLOUD
VIRTUAL INFRASTRUCTURE VIRTUALIZED DATA CENTER PRIVATE CLOUD PUBLIC CLOUD HYBRID CLOUD
NEW PERIMETER OF DEFENSE IN VIRTUAL INFRASTRUCTURE SAFE AND SECURED WITH THE SECOND LINE OF DEFENSE SECURITY PROTECTION WITH TRADITIONAL HARDWARE AND SOFTWARE REMAIN IMPORTANT TO ON-PREMISE DATA CENTER SECOND LINE OF DEFENSE IS NEEDED WHEN IMPLEMENTING THE VIRTUAL INFRASTRUCTURE
VIRTUAL INFRASTRUCTURE PROTECTION VIRTUAL APPLIANCES BECOME MORE COMMON VIRTUAL FIREWALL VIRTUAL ROUTER VIRTUAL LOAD BALANCER VIRTUAL SWITCH VIRTUAL DISTRIBUTED SWITCH VIRTUAL EVERYTHING
VIRTUAL FIREWALL / VIRTUAL ROUTER MONITOR, ANALYZE, FILTER TRAFFIC THROUGH ACCESS POINT SECURE & PROTECT CONNECTION TO ACCESS POINTS SECURE AND PROTECT TRANSFERRED DATA PROVIDE END POINTS SECURITY
VIRTUAL LOADBALANCER PROTECT COMPUTE AVAILABILITY
VIRTUAL SWITCH MANAGE NETWORK ISOLATE DATA AND COMPUTE TRAFFIC SHAPING TEAMING AND LOADBALANCING COMMONLY SEEN ON VIRTUALIZED INFRASTRUCTURE AND WILL BE SEEN MORE AND MORE ON CLOUD INFRASTRUCTURE
TRANSFERRED DATA MUST BE SECURED
TRANSFERRED DATA MUST BE ENCRYPTED
REPLICATE DATA MUST BE ENCRYPTED
STORED DATA MUST BE ENCRYPTED, TOO
NEEDED TECHNOLOGIES VM AND DATA ISOLATION IN VIRTUAL ENVIRONMENT AND CLOUD (FOR CONFIDENTIALITY AND PRIVACY) GLOBAL TRAFFIC MANAGEMENT CAPABILITIES (FOR HIGH AVAILABILITY DISASTER RECOVERY) VIRTUAL MACHINE INTEROPERABILITY (FOR MIGRATION BETWEEN DIFFERENT CLOUD INFRASTRUCTURE)
CASE STUDY
ก 2550-2553 ก ก ก 2550-2553 40,000,000.00 35,478,000.0 0 15,000,000.00 14,725,000.0 0 11,875,000.0 0 30,000,000.00 20,000,000.00 10,000,000.00 12,730,000.0 0 8,914,800.00 6,300,000.00 10,000,000.00 5,000,000.00 4,780,000.00 7,918,000.00 0.00 2550 2551 2552 2553 0.00 2550 2551 2552 2553 ก 2550-2553 ก ก 2550-2553 40,000,000.00 30,000,000.00 20,000,000.00 12,050,000.0 0 36,316,000.0 0 31,825,000.0 0 15,300,000.0 0 4,000,000.00 3,000,000.00 2,000,000.00 1,900,000.00 3,600,000.00 2,850,000.00 10,000,000.00 0.00 2550 2551 2552 2553 1,000,000.00 0.00 0.00 2550 2551 2552 2553
VIRTUALIZATION MANAGEMENT
VIRTUALIZATION MANAGEMENT
VIRTUALIZATION MANAGEMENT
VIRTUALIZATION MANAGEMENT
VIRTUALIZATION MANAGEMENT
VIRTUALIZATION MANAGEMENT
VIRTUALIZATION MANAGEMENT
CLOUD MANAGEMENT
CLOUD MANAGEMENT
CLOUD MANAGEMENT
CLOUD MANAGEMENT
CLOUD MANAGEMENT