Sei sulla pagina 1di 84

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Computing Foundations

2009 EMC Corporation. All rights reserved.

Welcome to Cloud Computing Foundation. The AUDIO portion of this course is supplemental to the material and is not a replacement for the student notes accompanying this course. EMC recommends downloading the Student Resource Guide from the Supporting Materials tab, and reading the notes in their entirety. Copyright 2009 EMC Corporation. All rights reserved. These materials may not be copied without EMC's written consent. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC , EMC, EMC ControlCenter, AdvantEdge, AlphaStor, ApplicationXtender, Avamar, Captiva, Catalog Solution, Celerra, Centera, CentraStar, ClaimPack, ClaimsEditor, ClaimsEditor, Professional, CLARalert, CLARiiON, ClientPak, CodeLink, Connectrix, Co-StandbyServer, Dantz, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, Document Sciences, Documentum, EmailXaminer, EmailXtender, EmailXtract, enVision, eRoom, Event Explorer, FLARE, FormWare, HighRoad, InputAccel,InputAccel Express, Invista, ISIS, Max Retriever, Navisphere, NetWorker, nLayers, OpenScale, PixTools, Powerlink, PowerPath, Rainfinity, RepliStor, ResourcePak, Retrospect, RSA, RSA Secured, RSA Security, SecurID, SecurWorld, Smarts, SnapShotServer, SnapView/IP, SRDF, Symmetrix, TimeFinder, VisualSAN, VSAM-Assist, WebXtender, where information lives, xPression, xPresso, Xtender, Xtender Solutions; and EMC OnCourse, EMC Proven, EMC Snap, EMC Storage Administrator, Acartus, Access Logix, ArchiveXtender, Authentic Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, C-Clip, Celerra Replicator, CLARevent, Codebook Correlation Technology, Common Information Model, CopyCross, CopyPoint, DatabaseXtender, Digital Mailroom, Direct Matrix, EDM, E-Lab, eInput, Enginuity, FarPoint, FirstPass, Fortress, Global File Virtualization, Graphic Visualization, InfoMover, Infoscape, MediaStor, MirrorView, Mozy, MozyEnterprise, MozyHome, MozyPro, NetWin, OnAlert, PowerSnap, QuickScan, RepliCare, SafeLine, SAN Advisor, SAN Copy, SAN Manager, SDMS, SnapImage, SnapSure, SnapView, StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix DMX, UltraFlex, UltraPoint, UltraScale, Viewlets, VisualSRM are trademarks of EMC Corporation. All other trademarks used herein are the property of their respective owners.
Cloud Computing Foundations - 1

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Course Objectives
Upon completion of this course, you will be able to: Define and understand cloud computing, Its types, benefits, and services Discuss cloud infrastructure and its components Evaluate the suitability and processes of migrating to cloud Describe challenges and concerns with the cloud computing Describe EMC positioning and products for cloud computing Explain the prospects of cloud computing
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 2

The objectives for this course are shown here. Please take a moment to read them.

Cloud Computing Foundations - 2

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

In This Course
This course contains the following modules: 1. Introduction to cloud computing 2. Cloud Infrastructure 3. Migration to cloud 4. Concerns and challenges of cloud 5. EMCs role and strategies 6. Future and vision of cloud computing Additional Information:
EMC Atmos: Whiteboard discussion

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 3

This course contains 6 modules and a whiteboard discussion on EMC Atmos. The modules are: Introduction to cloud computing, cloud infrastructure, migration to cloud, cloud concerns and challenges, EMCs role and strategies, and lastly future and vision of cloud computing.

Cloud Computing Foundations - 3

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module 1: Introduction to Cloud Computing


Upon completion of this module, you will be able to: Define cloud computing and cloud offerings Discuss the background of cloud computing Describe common cloud service models
Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (Iaas)

Discuss private, public and hybrid cloud Detail the benefits of cloud computing

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 4

The objectives for this module are shown here. Please take a moment to read them.

Cloud Computing Foundations - 4

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

IT Today

With Cloud

Organization Needs New Computing Resources


Existing Computing Practices Expand organizations infrastructure New Generation Computing Cloud Computing

Backup Storage
iSCSI, NAS, SAN

Archive
VMs VMs

Apps & Compute

Department A Department A Department B Department C

Department C Department B

Keep adding servers, storage, connectivity components, HVAC systems Increase Data Center (DC) resource utilization beyond physical limit CAPEX
2009 EMC Corporation. All rights reserved.

Extend virtualization beyond enterprise DC On-demand, self service requesting, metered Can hire computing resources from cloud service provider
Pay-as-you-go (chargeback) No CAPEX

Cloud Computing Foundations - 5

Increased dependency on online information leads to on-demand, reliable, secured, and speedy access to petabytes of information, which is further growing exponentially. Businesses must align themselves to accommodate this astonishing growth much faster than ever, which requires multi-fold increase in capacity or capability on the fly. The existing computing practices to meet this demand is invest and expand infrastructure, i.e., keep adding servers, storage and other necessary elements. The procurement and provisioning of these resources typically take a long time, which may impact the service levels demanded by the customer. Many organizations deploy server, storage, and network virtualization in a regional basis, or within a datacenter, which results in discrete virtual computing environments leveraged by various departments of an organization across the globe. Virtualization improves resource utilization, however this advantage can be envisaged only for limited period because of its discrete implementation, beyond which organizations have to scale up their expenditure to add new resources. These long standing pain points can be outdated with the emergence of a new computing technology called cloud computing. Cloud computing brings up a new generation of computing which enables an organization extend virtualization beyond its enterprise datacenter by aggregating IT resources scattered across the globe. Location independent virtual image of aggregated resources can be created and assigned dynamically on-demand with a metering service to monitor and report resource consumption. Cloud computing allows self service requesting empowered by fully automated request fulfillment process in the background. Organizations can build their own cloud by pooling and virtualizing distributed resources, as well as hiring computing resources from cloud service providers, and pay based on resource usage such as CPU hours used, amount of data transferred, and gigabytes of data stored.
Cloud Computing Foundations - 5

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

What is Cloud Computing?


The cloud is IT as a Service. Delivered by IT resources that are independent of location. - 451 Group

Cloud computing is a style of computing where massively scalable IT-related capabilities are provided as a service across the internet to multiple external customers. - Gartner A pool of abstracted, highly scalable, and managed infrastructure capable of hosting end-customer applications and billed by consumption. - Forrester Research

Cloud is a model for enabling convenient, on-demand network access to shared pool of configurable computing resources (e.g. networks, servers, storage, applications) that can be rapidly provisioned & released with minimal management effort or service provider interaction. - NIST
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 6

Cloud computing is still an evolving model, hence no common definition is available. Although research and analysts have published their own verdict, they are yet to be standardized. Lets see what analysts say about cloud computing. According to 451 Group says: The cloud is IT as a Service, delivered by IT resources that are independent of location. Gartner says: Cloud computing is a style of computing where massively scalable IT-related capabilities are provided as a service across the internet to multiple external customers. Forrester defines cloud computing as: A pool of abstracted, highly scalable, and managed infrastructure capable of hosting end-customer applications and billed by consumption. According to NIST: Cloud is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, and applications, that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Cloud Computing Foundations - 6

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Offering Examples - 1


I want secured backup of my files, so that I can retrieve from anywhere, anytime
rvice ckup se nline ba o d re u Sec

Pay-As-You-Go Salesforce.com EMC Mozy, Atmos Google App Engine

Amazon EC2, S3 es c r u o My organization needs to grow, but res uting cant spend much to buy new comp d n a em servers, storage On-d ty of varie cture e d i w tru nd fras l on y dema Tria tform/in nolog s ons e c a st tech e t pl Ac la e ag Lever

My organization want to test a software, before investment into it

I need a word processing application for brief period to prepare my documents

My organization handles critical customer data, but secured storage infrastructure is lacking
Cloud Computing Foundations - 7

2009 EMC Corporation. All rights reserved.

From business perspective, periodic upgrades of computing resources has become a necessity to deliver better and faster in the market. You might need to rapidly expand your business, which may enforce to multiply your organizations capability in terms of adding new servers, storage devices, network bandwidth etc. Critical business data must be protected and should be available to the intended user, which requires data security, and disaster recovery infrastructure. As your capital expenditure rises, the risk associated with the investment too increases. For small and medium size businesses, this may be a big challenge, which eventually restricts their business to grow. As an individual, it may not be sensible or affordable every time to purchase new applications if you need them only for a brief period.

Cloud Computing Foundations - 7

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Offering Examples - 2


I want secured backup of my files, so that I can retrieve from anywhere, anytime
rvice ckup se nline ba o d re u Sec

Pay-As-You-Go Salesforce.com EMC Mozy, Atmos Google App Engine

Amazon EC2, S3 es c r u o My organization needs to grow, but res uting cant spend much to buy new comp d n a em servers, storage On-d ty of varie cture e d i w tru nd fras l on y dema Tria tform/in nolog s ons e c a st tech e t pl Ac la e ag Lever

My organization want to test a software, before investment into it

I need a word processing application for brief period to prepare my documents

My organization handles critical customer data, but secured storage infrastructure is lacking
Cloud Computing Foundations - 8

2009 EMC Corporation. All rights reserved.

On the contrary to purchase new resources, cloud services are hired based on pay-per-use without involving any capital expenditures. Cloud service providers offer on-demand network access to configurable computing resources such as networks, servers, storage, and applications. You can scale up or down your demand of computing resources with minimal management effort or service provider interaction. Cloud service providers leverage cloud computing technology to pool and virtualize distributed computing resources, and provide location independent virtual image of aggregated resources, such as a virtual server with user specified hardware configuration, operating system, and applications. At any point in time you may discontinue a service or may switch to another cloud service. You can leverage cloud service providers expertise to store, protect, backup, and replicate data empowered by most advanced technology, which otherwise would cost you more.

Cloud Computing Foundations - 8

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Background of Cloud Computing - 1


Cloud Computing
Part of grid computing + most of utility computing + more New paradigm of computing

Utility Computing
Virtualization improves resource utilization and reduces CAPEX, OPEX Offer metered service

Grid Computing
Parallel computing Clustered node, kept ready to handle distributed workload Small workload causes unutilized/under-utilized node

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 9

Historically, cloud computing has evolved through grid and then utility computing. In grid computing environment, the workload is distributed or transferred to nodes with needed computing resources. Usually a chain of nodes, such as servers, are networked to form the grid. These nodes are typically clustered and are kept ready to handle the distributed workload. Grid computing enables parallel computing, although its utility is best for large workloads.

Cloud Computing Foundations - 9

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Background of Cloud Computing - 2


Cloud Computing
Part of grid computing + most of utility computing + more New paradigm of computing

Utility Computing
Virtualization improves resource utilization and reduces CAPEX, OPEX Offer metered service

Grid Computing
Parallel computing Clustered node, kept ready to handle distributed workload Small workload causes unutilized/under-utilized node

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 10

The emergence of the virtualization technology at storage, servers, and network allows organizations to offer on-demand, metered service similar to public utility, hence the term utility computing. The main benefit of utility computing is capital and operational cost savings. Most datacenters have underutilized servers, storage networks, and storage, due to over provisioning to handle peak workload, sudden spike, and projected growth. Utility computing introduces pay only for what you use models, allowing organizations to hire computing resources when required.

Cloud Computing Foundations - 10

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Background of Cloud Computing - 3


Cloud Computing
Part of grid computing + most of utility computing + more New paradigm of computing

Utility Computing
Virtualization improves resource utilization and reduces CAPEX, OPEX Offer metered service

Grid Computing
Parallel computing Clustered node, kept ready to handle distributed workload Small workload causes unutilized/under-utilized node

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 11

Cloud computing has borrowed many concepts of grid computing; however, the computing resources can be dynamically allocated or upgraded, even at a more granular level based on workload demand. Additionally, cloud computing can be developed with non-grid environments, such as a three-tier web architecture running traditional or Web 2.0 applications. The backbone of cloud computing is utility computing, however, it offers a wider picture. It can be applied internal to an organization to build its own cloud infrastructure, in addition to utility services. Cloud provides the opportunity of unlimited scalability, significant cost savings, internet based access, workload balancing, dynamic and fine granular provisioning, and self service requesting. It is an emerging technology, but already considered as another generation of computing, after mainframe, personal computer, client-server computing, and the web.

Cloud Computing Foundations - 11

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Services
Cloud computing enables cloud services Characteristics:
On-Demand / Self Service Accessed via the internet Minimal/no IT skills to implement cloud services Underlying technology is transparent to the user Web browser or web service API based access Dedicated or shared resources Rapid Elasticity Measured service

Cloud service offerings classified into three models


SaaS, PaaS, IaaS
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 12

Cloud computing enables cloud services such as backup, archive, web e-mail, and word processing for individual and business. Some of the characteristics of cloud services are listed on the slide. A cloud service user can unilaterally provision computing resources when needed, with no human interaction with a service provider. Cloud services are typically accessed via the Internet. Cloud service providers off-load all the computational job from cloud users. Cloud users leverage ready to use services and may need to select service parameters to customize the services. Cloud implementation details are transparent to the consumers who receive completely automated response from cloud computing infrastructure. User can access cloud services using a web browser or web service APIs. A cloud may be dedicated for use to an organization, or multiple organizations can share common cloud computing resources. Cloud computing allows a user to scale up, down, out, or back the demand for IT resources rapidly and easily. This elastic resource provisioning capability often provides a sense of unlimited scalability to the cloud service user. Cloud computing enables a metered service for billing and chargeback for the cloud resource accessed. The metered services continuously monitors resource usage such as CPU time, bandwidth, storage capacity and reports to the cloud service user providing transparency for both provider and user. Cloud service offerings can be classified into three models: Software as a Service or SaaS, Platform as a Service or PaaS, and Infrastructure as a Service or IaaS. We will discuss these models in subsequent slides.
Cloud Computing Foundations - 12

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Software-as-a-Service Model
Tenant 1 Tenant 2
Hired Resources

You pay for the application Examples:


Salesforce.com EMC Mozy (Backup as the service) Google Apps

Application

Web/App Server Middleware Databases OS

Storage Networking

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 13

This slide looks at the Software as a Service (SaaS) model. The capability provided to the consumer is to use the providers applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. [Source: National Institute of Standards and Technology (NIST), Information Technology Laboratory ] To access software as a service, cloud users pay only for the application they use. A few leading examples of software as a service are Salesforce.com, which provides access to the various business software to its subscribers, EMC Mozy, which offers secured online backup service to its clients, and Google Apps, offering email and word processing services.

Cloud Computing Foundations - 13

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Platform-as-a-Service Model
Tenant 1 Tenant 2

Application

Application

You pay for the platform software components


Web application environment Databases OS instances Middleware

Hired Resources

Web/App Server Middleware Databases OS

Your applications are built on top Examples:


Google App Engine Microsoft Azure Force.com Platform

Storage Networking

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 14

This slide describes the Platform as a Service (PaaS) model. The capability provided to the consumer is to deploy consumer-created or acquired applications (created using programming languages and tools supported by the provider) on the cloud infrastructure. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. [Source: National Institute of Standards and Technology (NIST), Information Technology Laboratory ] For platform as a service, users pay only for the platform software components such as web application environment, databases, OS instances, and middleware, on top of which applications are launched. Google App Engine, Microsoft Azure, and Force.com are foremost examples of platform as a service.

Cloud Computing Foundations - 14

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Infrastructure-as-a-Service Model
Tenant 1 Tenant 2

Application

Application

You pay for the infrastructure components


Storage Network Connectivity

Web/App Server Middleware Databases OS

Web/App Server Middleware Databases OS

Your OS image and applications on top Examples:


Amazon EC2 EMC Atmos

Hired Resources

Storage Networking

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 15

This slide illustrates the Infrastructure as a Service (IaaS) model. The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, deployed applications, and possibly limited control of select networking components for example host firewalls. [Source: National Institute of Standards and Technology (NIST), Information Technology Laboratory ] To use infrastructure as a service, cloud service user only pays for the infrastructure components, which include storage and networking resources. Amazon EC2 is an example of infrastructure as a service. It allows user to build virtual machines and install their software on top of it. EMC Atmos is the first multi-petabyte information management offering, designed to help customers automatically manage and optimize the delivery of rich, unstructured information across largescale global cloud storage environments.

Cloud Computing Foundations - 15

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Types of Cloud Computing - 1

Private Cloud

Public Cloud

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 16

Cloud computing can be classified into three deployment models, private, public, and hybrid, which provide a basis for how cloud infrastructures are constructed and consumed. In Private Cloud, infrastructure is deployed and operated exclusively for an organization or enterprise. It may be managed by the organization or by an independent third party and may exist on-premise or off-premise at a hosting facility. Public Cloud infrastructure is available to public or many industry groups or customers. It is owned by the organizations promoting and selling cloud services. This can also be thought of as an on-demand and a pay-as-you-go environment where there are no on-site infrastructure or management requirements; however, the environment is no longer within the customers perimeter. [Source: NIST] Popular examples of public clouds include Amazons Elastic Compute Cloud (EC2), Google Apps, and Salesforce.com.

Cloud Computing Foundations - 16

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Types of Cloud Computing - 2

Hybrid Cloud

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 17

Hybrid Cloud is a composition of two or more clouds, private and public. Each cloud retains its unique entities. Clouds may be federated or bound together by technology, enabling data and application portability. Hybrid cloud is prevalent for several reasons. For example, many organizations have existing private cloud infrastructure and may need to extend their capability, or often the benefits of combining both private and public clouds may be a more efficient model to handle an unexpected surge in the application workload. [Source: NIST] Most large organization CIOs are holding off on putting their computing requirements on public cloud, but leading to develop private cloud. In this case, critical customer data can be restricted within an organizations private cloud; however management and monitoring applications can run on public cloud. Customer gets updates from the public cloud and can send queries. Both the clouds remain partitioned from each other, however, together they form a hybrid cloud.

Cloud Computing Foundations - 17

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Benefits - 1
Increased capability Improved performance Lower cost High availability Reduced risk Flexible scaling No infrastructure management complexity

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 18

Let us list and discuss various cloud benefits: Increased capability: Consumers can leverage cloud service providers expertise for infrastructure management, backup, disaster recovery, load sharing, data compression, deduplication, encryption, and security services. Improved performance: Performance can be scaled up by distributing CPU intensive tasks to multiple offsite locations. For example, a sudden surge in the workload during peak season can be handled by dynamically allocating additional computing resources within the cloud for the workload.

Cloud Computing Foundations - 18

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Benefits - 2
Increased capability Improved performance Lower cost High availability Reduced risk Flexible scaling No infrastructure management complexity

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 19

Lower cost: Cloud services can be hired, therefore, cloud consumers can save money as there is no capital expenditure or CAPEX required. Customers leverage cloud service providers infrastructure, hence there is no ongoing expenses for running datacenter such as cost of power, HVAC system, additionally real estate cost can be minimized. Cloud computing allows companies to only pay for the computing resources they access on a metered basis. Organizations can curb their operational expenditure, or OPEX, by only using cloud resources when it is required and terminate the service after their job is done. Cloud consumers can further reduce their cost by leveraging automated tiered services offered by the cloud service providers. For example, if your company is using Infrastructure as a Service and your application workload is not demanding, your application and operating system can be redirected from using tier 1 to tier 2 storage. Cloud resources can be shared among multiple consumers or tenants, although mechanisms built-in the cloud prevents them to know about each others existence. Sharing of resources further lowers the rent of cloud services. When running your applications in the cloud, it means you are paying for their staff to service your business needs. That allows you to redeploy your existing staff to other projects specifically tied to your business rather than providing a utility service such as e-mail. This also reduces the time to market.

Cloud Computing Foundations - 19

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Benefits - 3
Increased capability Improved performance Lower cost High availability Reduced risk Flexible scaling No infrastructure management complexity

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 20

High availability: Cloud computing has the ability to ensure application availability with varying levels depending on customer policy and priority of the application. Redundant server, network resources, and storage equipment along with clustered software enables fault tolerance. These techniques encompasses multiple datacenters in different geographic region having identical resource configuration and application instances, which prevents data unavailability due to regional failures. Clustered resources are synchronized and user data is replicated so that cloud service users can be non-disruptively moved to standby resources. Only a virtual view of distributed computing resources are provided to the customers, virtual to physical resource mapping remains hidden to the consumer. Therefore, this movement is transparent to the cloud service users. Reduced risk: Another fundamental advantage of cloud is there is no risk of investing large amount or signing long term agreement. If the project is not viable, you stop paying for it and if needed, change the cloud services immediately. Cloud is ideal for test and experimenting with new software. Flexible scaling: Cloud can be easily and instantly scaled up and down based on demand. It appears to the consumers that cloud resources are expandable to infinite limit. Cloud allows self service requesting. Cloud service users can independently and automatically scale their computing capabilities without any human interaction with cloud service providers. No infrastructure management complexity: Because cloud resources can be hired, this eliminates monitoring, provisioning, backup, replication, and maintenance issues.

Cloud Computing Foundations - 20

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module Summary
Key points covered in this module: Cloud computing definition and offerings Evolution of cloud computing Cloud services
SaaS, PaaS, and Iaas model
Web/App Server Middleware Databases OS Application

Types of cloud computing


Private, public and hybrid cloud
Storage

Benefits of cloud computing

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 21

These are the key points covered in this module. Please take a moment to review them.

Cloud Computing Foundations - 21

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module 2: Cloud Infrastructure


Upon completion of this module, you will be able to: Detail various components of cloud computing Describe cloud infrastructure layers Explain the series of cloud computing processes to enable a service Describe cloud storage infrastructure Describe the steps for storing file to cloud storage

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 22

The objectives for this module are shown here. Please take a moment to read them.

Cloud Computing Foundations - 22

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Components
Front-end

Client Devices User Access Interface

Cloud Services
(SaaS,PaaS,laaS)

Cloud Hardware
Back-end
(server, storage, interconnectivity devices)

Cloud Software
(cloud OS, middleware, security tool, management tools, load balancing tool, metering tool, automation tool)

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 23

Cloud computing architecture is the unification of modular components to provide cloud services. These components can be broadly classified as front-end, and back-end. The front-end includes users computing devices which may be wireless or wired to a LAN and user interfaces to access cloud offerings. Back-end consists of underlying cloud computing infrastructure responsible for providing cloud services. A network, typically internet, must exist to connect front-end and back-end components. User interface can be web services APIs, specified by cloud providers or web based program, such as e-mail application, which runs on a standard web browser. Back-end components are cloud software, hardware, and services. Cloud hardware includes servers, data storage systems, and interconnectivity devices. Cloud software encompasses cloud operating system, and middleware. Cloud operating system enables expansion of the server, storage, and network virtualization beyond physical datacenter by pooling resources from multiple sites. The resources are aggregated and federated together so that applications can act on the single pool of resources. Middleware such as messaging tools facilitates communication among network connected cloud resources. Other software are, security tools, management tools such as monitoring, provisioning, and disaster recovery tools, load balancing tool, metering tool, and automation tools which enable self service requesting. On top of cloud hardware, and software, cloud services such as SaaS, PaaS, and IaaS are enabled, cataloged, and published.
Cloud Computing Foundations - 23

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Infrastructure Layers - 1


Services
Catalog of available services Options, parameters

Service Management
User request management Provisioning, performance tuning Metering DR/ backup License management Information security management

Aggregation Layer
Cloud OS, mobility software, middleware (Virtual Image deployment, workload management, integrated security, high availability), interconnecting devices

Virtualization Layer

Virtualization Layer

Servers

Storage

Network

Servers

Storage

Network

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 24

This slide looks at the layered appearance of cloud infrastructure. The bottom layer consists of physical resources, including servers, storage systems, and network components, which are physical elements of a datacenter. The virtualization layer is used to create virtual resources and map virtual resources to physical elements of a datacenter. Server, storage, and network virtualization technologies take pivotal roles to create the virtualization layer. An organization may have islands of such virtualized resources scattered across the globe.

Cloud Computing Foundations - 24

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Infrastructure Layers - 2


Services
Catalog of available services Options, parameters

Service Management
User request management Provisioning, performance tuning Metering DR/ backup License management Information security management

Aggregation Layer
Cloud OS, mobility software, middleware (Virtual Image deployment, workload management, integrated security, high availability), interconnecting devices

Virtualization Layer

Virtualization Layer

Servers

Storage

Network

Servers

Storage

Network

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 25

The aggregation layer extends the virtualization concept beyond physical datacenter by aggregating virtualized and physical computing resources located at various offsite locations. Aggregation layer provides a virtual view of resources, as one big resource, or as many little ones. Aggregated resources form the basis of cloud which is managed centrally as a single pool of computing resources. All the network communication between distributed resources are optimized to enable seamless workload distribution and data mobility among the sites. The mobility and distribution is transparent to the cloud users. Cloud operating system is responsible for aggregating distributed resources and provides virtual view of these resources. Mobility tools, and middleware software have key roles in workload distribution, virtual image to physical resource allocation, integrated security, and failover.

Cloud Computing Foundations - 25

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Infrastructure Layers - 3


Services
Catalog of available services Options, parameters

Service Management
User request management Provisioning, performance tuning Metering DR/ backup License management Information security management

Aggregation Layer
Cloud OS, mobility software, middleware (Virtual Image deployment, workload management, integrated security, high availability), interconnecting devices

Virtualization Layer

Virtualization Layer

Servers

Storage

Network

Servers

Storage

Network

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 26

The service management layer runs service management software, which automates the user request fulfillment process by sending instructions to the aggregation layer. This software enables self-service provisioning and performance tuning, metering such as bandwidth and storage usage, business continuity policies such as number of replicas for disaster recovery, and license management. In addition to that, the software has either in-built security mechanism or the capability to interact with external security services to implement authentication, access control, and auditing features. On top of the stack is the services layer, which publishes catalogs of available cloud services for cloud users. When a service is selected, this layer may provide a list options and parameters associated to the service. Cloud users may select appropriate options and necessary parameters to customize a service.

Cloud Computing Foundations - 26

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

How Cloud Works - 1


Cloud Service User
User request (User ID + service parameters)

Cloud Service Provider

Create
User interface Catalog of published services Options and settings

Cloud Services Maintain Publish

Service Delivery

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 27

The model of delivering cloud services can be segregated into two entities: Cloud service user and cloud service provider. Cloud service providers create, publish, and maintain cloud services. Cloud service users can be an administrator of the cloud service consumers organization who requests a service for employees, or an individual. Users can view a catalog of published services and select necessary options using web browser or web service APIs. When a user selects or requests a service, user identity information plus selected service parameters are transferred to the service provider.

Cloud Computing Foundations - 27

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

How Cloud Works - 2


Cloud Service User
User request (User ID + service parameters)

Cloud Service Provider


Validation of user identity

User request management tools processes user request and initiate user request fulfillment operation

User interface Catalog of published services Options and settings

User request management process sends instructions to the aggregation layer

Aggregation layer creates virtual image by aggregating necessary physical resources or uses preconfigured template (provisioning, performance tuning, monitoring, metering, policy, security)

Service Delivery

Launch user specified application and platform software on virtual image

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 28

Cloud service providers validate the user identity as part of security services they offer. After validation, user request management tools process user request and initiate user request fulfillment operations. A user request management process sends instructions to the aggregation layer to provision cloud resources for creating virtual image. The service parameters are implemented while creating a virtual image from distributed physical and virtual resources, and a user ID is used to set policy for the requested service. A policy can be associated with business continuity, archiving, resource location, etc. For example, a storage service may be allied with a policy to create three synchronous replicas and one asynchronous replica at specific locations or to set a retention period during which data cannot be modified. Otherwise, preconfigured image templates, maintained by the cloud service providers, are used to assign virtual images. In addition to this, cloud service providers offer monitoring services so that users can observe the performance of virtual image they created and may change the settings, if required. Cloud providers associate metering service to enable pay-as-you-go feature. Once the virtual image is ready, user specified applications and platform software may be launched on top of the virtual image. Now the user can leverage the specified service. Note that, at any time a user can update or terminate the service, depending upon their role and privilege. Termination of service destroys the image and releases cloud resources.

Cloud Computing Foundations - 28

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Storage Infrastructure - 1

Aggregation or pooling of Virtual/physical storage devices NAS, iSCSI, SAN Isolated Virtualized Storage Devices Distributed Physical Storage Devices
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 29

Cloud storage services are created on top of cloud storage infrastructure, which mostly consists of elements found in enterprise datacenter. However, these elements are integrated and provisioned in such that their combined capability can be raised dynamically according to the need of cloud users. Aggregation technology enables pooling of virtual or physical storage devices scattered at various geographic locations using NAS, iSCSI, and SAN protocols. This pool of storage resources are managed as a single entity which simplifies and facilitates the placement and tracking of application data among physical storage devices.

Cloud Computing Foundations - 29

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Storage Infrastructure - 2

Cloud storage functionalities (High scalability and performance, virtual provisioning, security Data protection, de-duplication, encryption, compression, tiering, Load balancing, replication, backup, archive, chargeback) Aggregation or pooling of Virtual/physical storage devices NAS, iSCSI, SAN Isolated Virtualized Storage Devices Distributed Physical Storage Devices
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 30

Cloud storage service providers typically set up storage infrastructures that can handle large workloads to ensure sudden demand of storage resources, performance, and availability. Therefore cloud storage devices must have functionalities like high scalability, high performance, virtual and automated provisioning, security control and data protection. Enterprise datacenters also leverage these functionalities; however, they are deployed at mass scale so that cloud users feels that the storage infrastructure is stretchable to infinite limit. Other functionalities are de-duplication, encryption, compression, tiered storage service, load balancing, replication, backup, archiving, and chargeback.

Cloud Computing Foundations - 30

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Storage Infrastructure - 3

User request management (Policy management, resource management) Cloud storage functionalities (High scalability and performance, virtual provisioning, security Data protection, de-duplication, encryption, compression, tiering, Load balancing, replication, backup, archive, chargeback) Aggregation or pooling of Virtual/physical storage devices NAS, iSCSI, SAN Isolated Virtualized Storage Devices Distributed Physical Storage Devices
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 31

User request management process typically runs on a storage service node and receives user request for creating, updating, and discarding service, as well as for storing data to the cloud storage. It invokes user request fulfillment processes for policy management and resource management. These processes pass instructions to the aggregation layer to create suitable virtual storage devices. Applying a storage services policy for a specific user or application data is a two step operation: Step 1: Categorization of the data based on service metadata and user ID Step 2: Define functionalities for storing data of each category Resource management process is responsible for optimized data placement, clustering, and tracking of data locations. Optimization enables faster storage and retrieval of user data. For example, striping data across all cloud storage drives containing an application data to improve I/O performance, or data may be read from the same location as the client request or data may be read from the replica that is the fewest network hops away.

Cloud Computing Foundations - 31

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Storage Infrastructure - 4

Cloud user access interface Application, and platform software/middleware Exported cloud optimized storage devices (FC, iSCSI) Cloud storage services interface (NFS/CIFS, SOAP,REST) User request management (Policy management, resource management) Cloud storage functionalities (High scalability and performance, virtual provisioning, security Data protection, de-duplication, encryption, compression, tiering, Load balancing, replication, backup, archive, chargeback) Aggregation or pooling of Virtual/physical storage devices NAS, iSCSI, SAN Isolated Virtualized Storage Devices Distributed Physical Storage Devices
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 32

Cloud storage services interface publishes services offered by the cloud storage provider, allow user or application to request a service, and export cloud optimized storage devices. Data coming from user or application are treated as object and a unique object ID is used for object reference. Applications can leverage exported cloud storage devices when storage service request is fulfilled. User or application access to the storage services may require NFS or CIFS connections and web object interface protocols such as HTTPs, SOAP, and REST.

Cloud Computing Foundations - 32

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Storing a File to Cloud Storage - 1


Store and retrieve user data as object
Irrespective of file level, block level, or streaming bits Object ID is used for reference

Object metadata is used to enforce policies Object ID is returned to users application


Data retrieved using only object ID, end-to-end

Database maintained to locate physical storage resources for each object ID

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 33

Cloud storage infrastructure stores and retrieves all incoming user data as object, regardless of file level, block level, or streaming bits of information. For example, an object can be a word document, pdf file, or a video file; however, they are treated as object stored at the cloud virtual storage and identified by an object ID. Object descriptors or metadata such as identity of application or user who has created data, content type of the object, date of creation are also transferred along with the user data which are used to enforce policies and functionalities for the object. This object ID is returned to the users applications so that a file can be retrieved using only object ID end-to-end. Cloud resource management process maintains database for physical storage resources for each object ID, which speeds up storing, update, and retrieval of user data.

Cloud Computing Foundations - 33

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Storing a File to Cloud Storage - 2


Thin Client 1 2 WebService API OS 6 1. 2. Thin client passes file to application Application sends the request and the file to cloud storage using web service protocols such as SOAP/REST Cloud storage service interface passes the file and metadata to the user request management node User request management process invokes policy management process and resource management process to define policy and determine layout File is stored as object to virtual image which is mapped to distributed physical resources Object ID is returned to the application through cloud storage service interface
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 34

Policy management

Resource management

Application

3 Cloud Storage Services Interface 6 5 Virtual image of storage UserRequest Management Node

3.

4.

Physical Storage location 1

Physical Storage location 3

5. 6.

Physical Storage location 2

Lets have a look at the operational steps of storing a file to the cloud storage. Consider that a user, having a thin device, sends a file to the application server which leverages cloud storage. Application passes the file to the cloud storage service interface using web service protocols such as SOAP, or REST. Cloud storage service interface passes the file and the file metadata to the user request management node. This node runs user request management process which invokes policy management and resource management processes. Policy management process analyze the file metadata and define a strategy for storing the file. Based on the strategy, resource management process determines the layout for storing the file. It communicates with the aggregation layer technology to create virtual image from the physical storage devices which may be located at offsite locations depending on the layout determined before. An object ID is generated for the file and passed to the user request management node, along with the layout information. User request management node stores the file as objects. Resource management process tracks the physical storage devices for each object ID. After storing the object, the object ID is returned to the application via cloud storage services interface.

Cloud Computing Foundations - 34

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module Summary
Key points covered in this module: Components of cloud computing
Front-end and back-end components

Cloud infrastructure layers Cloud service request fulfillment procedure Cloud storage infrastructure Steps for storing file to cloud storage

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 35

These are the key points covered in this module. Please take a moment to review them.

Cloud Computing Foundations - 35

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module 3: Migration To Cloud


Upon completion of this module, you will be able to: Understand cloud migration consideration Describe process and steps to cloud move Identify right cloud model for your organization Discuss private cloud as a preferred choice for organizations Understand factors for choosing right application for cloud move

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 36

The objectives for this module are shown here. Please take a moment to read them.

Cloud Computing Foundations - 36

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Are You Ready For The Cloud??


CIOs/IT Managers seeking move to cloud faces several questions: How do I start with the cloud? Do I need to re-configure my infrastructure? Does cloud infrastructure support my application? Is the cloud infrastructure capable of providing required QoS? How will I address Change Management and integration concerns?
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 37

Enterprises are not only looking to get a financial advantage with their first cloud move but also making a significant learning experience to gradually expand their cloud perspective. Businesses, determining how to make their first move into the cloud always face a question How do I start with the cloud? since a risk of introducing immature clouds into an established system. Most companies are not ready to abandon their existing IT investments to move all of their business processes fully to the cloud at once. Instead, it is more likely to be a gradual shift in business processes to the cloud over time, similar by nature to a perpetual proof of concept. The reason behind this hesitation is the cloud providers are not offering the same levels of security, controls, and performance assurances that organizations have on-premise. And there is lack of sufficient regulatory compliances and policies.

Cloud Computing Foundations - 37

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Migration To Cloud Considerations - 1


Understand How cloud fits to your requirements
Understand current infrastructure and requirements
Application perspective, network perspective and security perspective

Business processes and policies Consider Risk Vs Convenience profile


Individual

Startup Risk SMB

Enterprise

Convenience
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 38

Any organization considering a move to the cloud needs to understand and address various concerns which can make their perceived benefits short-lived. Studies based on experience of cloud early adopters suggest that moving to the cloud without proper strategy and process does not make much sense. The most important concern that needs to be evaluated before making a move to cloud is How cloud computing fits in the context of organizations overall business strategy. Sometimes a cloud may look great from an application perspective, but may be a challenge for network administrator in a real time environment, or security may say no to have data outside of the firewall. Risk versus convenience is a key consideration for deciding cloud migration strategy. Cloud benefits are well established, but data may reside outside the organizations perimeter which involves risk. A balance must be evaluated to determine how much risk an individual or organization may handle for the sake of convenience. This proportion varies among cloud consumers, based on they may be segmented into individual, business startup, small and medium business, and enterprise. Typically, individuals and startup businesses are ready to take high risk to get most of the convenience offered by a cloud. Compared to that, SMBs and enterprises are more sensitive to risk and are unlikely to move their tier 1 applications to a cloud.

Cloud Computing Foundations - 38

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Migration To Cloud Considerations - 2


How to integrate with existing IT system
To ensure desired performance, availability and security

Identify best fit cloud model for your organization


Private or public or hybrid

Plan and strategize your move


Understand impact, risk and benefits Understand billing model

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 39

Another concern is How to integrate cloud computing into existing IT systems and applications to ensure performance, availability and security. According to analysis, most CIOs and IT executives cite security as their primary concern to cloud computing. Integrated cloud computing involves moving sensitive data between the cloud and in-house networks, and effects the data security. A decision to move to cloud should be based on the understanding of which cloud computing model will be most suitable for the organization. We will discuss and identify the best fit cloud model for different cloud service user in the next slide. While designing a cloud strategy, organizations need to identify integration requirements for each process and system and determine the number of simultaneous requests to be handled. They also need to ensure availability of information, even if the cloud or in-house source goes down. In other words, enterprises should not consider cloud as an alternative but as an added architecture that provides more value from IT resources, while preserving enterprise process, policies, and security.

Cloud Computing Foundations - 39

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

What Model Fit for You


Individual Individual Startup Startup SMB SMB Enterprise Enterprise

Public Cloud Convenience Outweighs Risk Low Cost or Free Email, eCommerce, Social Nets, Gaming

Hybrid Cloud Tier 1 Apps: Private cloud Tier 2-4: Public cloud for Backup, Archive, testing Non OLTP Apps Private and Hybrid Cloud Tier 2-4: Private cloud Hybrid cloud: Public cloud for Backup, Archive, testing, Websites, portals
Cloud Computing Foundations - 40

Public Cloud Convenience Outweighs Risk CAPEX VS OPEX Self-Service Back Office, Development, & Production
2009 EMC Corporation. All rights reserved.

Lets understand which cloud computing model will be most suitable for an organization or individual. Public cloud is preferred by individuals who want to access e-mail, e-commerce, or gaming applications, and least bothered about the security or availability risks in cloud for the most part. Here cost reduction is the primary objective. Public cloud enables the opportunity to access these applications using a thin device for free or by paying minimum usage charges. People starting up businesses from small office or home typically opt public cloud. A large investment to purchase IT resources are not affordable or sensible. Therefore, for obvious reason, convenience offered by the cloud outweighs risk. Small and medium sized business have a moderate customer base and any anomaly in customer data and service levels may impact their business. Hence, they may not be willing or able to put Tier 1 applications such as OLTP in the cloud. A hybrid cloud model may fit in this case, which includes organizations internal IT resources and external public cloud resources. Tier 1 application data should never cross the boundary of private cloud. Public cloud enables cost savings and faster time to market and is typically used for tier 2, tier 3, and tier 4 applications such as backup, archive, and testing. Enterprises typically have strong customer hold worldwide and priority is to maintain critical customer data and service levels with strict enforcement of security policies. They are highly concerned with the risk and information access control in cloud. Many organizations may not even virtualize their tier 1 applications. They are financially capable of building a massive private cloud, however, a hybrid cloud model could be a viable option.
Cloud Computing Foundations - 40

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

First Step To Cloud: Virtualization


Optimize existing resources virtualize the data center
Combine resources together and abstract them to create a virtual world Virtualization of application and infrastructure

Extend the virtualization beyond a data center


Pool all your distributed resources from multiple sites
APP OS
APP OS APP APP OS OS

APP OS

APP OS

APP OS

APP OS

APP OS

APP OS

APP OS

APP OS

Virtualized Infrastructure
Data Center Location 1 APP OS
APP APP APP APP OS OS OS OS

Data Center Location 2 APP OS


APP APP APP APP OS OS OS OS

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 41

In many ways, the cloud computing is an evolution of what is already happening in data centers: virtualization, automation and dynamic infrastructure provisioning, all aimed at creating realtime infrastructures for flexible and dynamic service delivery. Virtualization is considered to be the first step to cloud computing, With virtualization as an underpinning, not only do enterprises get the benefit of increased asset utilization, but also take the first step toward cloud by defining their applications, independent from their physical infrastructure. With virtualizing and aggregating computing resources into a single pool, you have the opportunity to operate more efficiently and also operate more flexibly and reliably. You can start using this shared infrastructure for doing test and development or for doing better disaster recovery, for example two data centers that act as failover for one another. Virtualization also provides a level-up in managing your IT by helping you to get away from issues of underlying infrastructure. With virtualization, you can also automate a lot of the general management tasks, extricating IT from the business of repetitive management procedures, and at the same time enabling your end users to get what they need very quickly.

Cloud Computing Foundations - 41

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Private Cloud As a Preferred Option


Most large organizations are experimenting first with private clouds Cloudification of pooled & virtualized internal computing resources involves
Centralized service management, service creation, automation Self service, auto provisioning, metering, load balancing, security, tiering

APP OS

APP OS

APP APP OS OS

APP OS

APP OS

APP OS

APP OS

APP OS

APP OS

APP OS

APP APP OS OS

APP OS

APP OS

APP OS

Cloud Operating System

Data Center Location 1

Data Center Location 2

Data Center Location 3

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 42

After aggregating and virtualizing an organizations IT resources, the next step is to enforce centralized service management, service creation, automation, and associate processes and technologies such as self-service, metering, load balancing, business continuity, security, automated tiering, and de-duplication. This forms a private cloud with internal IT resources as its base. Based on the demand of a cloud service user, virtual images with required configuration are created and operating system and applications are launched on top of them. The cloud operating system and middleware have key roles in consolidation of resources, providing virtual view of these resources, workload distribution, virtual image to physical resource allocation, integrated security, and failover.

Cloud Computing Foundations - 42

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Private Cloud Federating with External Cloud


A blend of internal and external cloud resources to present a seamless, managed service delivery to the business Probably offers the best value to the enterprise

Private Cloud
APP OS
APP OS APP APP OS OS

APP OS

APP OS

APP OS

APP OS

APP OS

APP OS

APP OS

APP APP OS OS

APP OS

APP OS

APP OS

Cloud Operating System

Internal Cloud
Data Center Location 1 Data Center Location 2

External Cloud

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 43

Finally, once your private internal cloud has been streamlined, there is an opportunity to federate with external infrastructures provided by the cloud service providers, blending the two into a single collection of resources that your organization can use. The key is that they are never separate resources, they are all one pool. External cloud resources can be seamlessly and transparently joined when needed. Federation allows rapid elasticity of cloud resources and provides a sense of unlimited scalability to the cloud service users. Now let us understand how can we get the best of both worlds the internal cloud and the external cloud without getting the weakness of either.

Cloud Computing Foundations - 43

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Why Private Cloud Get the Best of Both World


Trusted Control Reliable Secure
Federation
Virtualization

Flexible Dynamic On-demand Efficient

Internal Cloud

Information

External Cloud

Security
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 44

What we like about data centers is that theyre rock-solid, trusted, controlled, reliable, and secure. But they can be expensive. What everyone finds so appealing about cloud computing is the pay by the drink, elastic nature of the resources flexible, dynamic, on-demand, and efficient meaning cost effective. We have a vision that joins the best of both world without the downside of either. The resources are aggregated and federated together so that applications can act on the combined resources as a single pool of resources, just like the single pool of resources available to us today when we use VMware to join servers from multiple racks in a data center. This forms the private cloud that enables us to get the best of both worlds. The word Private is used because the use and operation of the cloud resources are completely controlled and only available to the enterprise. A cloud resource looks and behaves just like the resources you purchased outright in the past.

Cloud Computing Foundations - 44

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Path to Private Cloud

Optimize use of Federated resources

Deliver IT as a Service

Federation with compatible service providers

CHOICE

Manage and Automate the Infrastructure

Unified Management

CONTROL

Move apps into virtual machines

Virtualization and Consolidation

EFFICIENCY
Cloud Computing Foundations - 45

2009 EMC Corporation. All rights reserved.

The three top value points of private cloud are efficiency, control and choice. The private cloud delivers uncompromised control, in the most efficient manner, while fully preserving customer choice. Efficiency Private cloud eliminates unnecessary/unused IT investment, makes better use of what you have, and minimizes resources needed to manage and maintain IT. Translated into business terms, efficiency drives both capex and opex savings. It changes the old model of application and information delivery that is tied to specific systems and architectures, and moves to a self-managed, dynamically optimized environment. The result is a more efficient delivery of business services. Control Private cloud enables the business and IT to determine service levels together and fully control the quality-of-service for application delivery without compromise. The automation, control and insight of the physical world and the virtual world with the focus on service delivery is what enables IT to shift away from running IT to delivering IT. Choice The ability to join resources together to aggregate and federate resources means that IT has new choices, and new options available. Why buy the infrastructure needed to run the operation at peak load when external cloud resources can be seamlessly and transparently joined when needed?

Cloud Computing Foundations - 45

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

What you need to be Cloud Enabled


Requirement
On-Demand / Self Service

Capabilities
FAST Automatic Tiering Self-Config, Self-Heal, Self-Manage Virtual Provisioning Multi-protocol FC, iSCSI, NAS, MPFS REST, SOAP

What it Delivers
Efficiency (On Demand) Control (Self-service)

Broad Network Access Resource Pooling

Choice Efficiency Choice Efficiency

Deduplication, Compression, Thin Provisioning Spin-down, Low Power Drives

Rapid Elasticity Measured Services

Policy-driven data migration Federation of Virtual Archives Automatic Failover with SRM Resource usage can be monitored, controlled, reported Billing/metering systems to chargeback for usage

Efficiency Choice Control Choice Control


Cloud Computing Foundations - 46

2009 EMC Corporation. All rights reserved.

The slide lists the requirements and capabilities to be cloud enabled. Please take a moment to review them and the values they deliver.

Cloud Computing Foundations - 46

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Experiment with Public Cloud


For Non-core business applications Best option for individuals or startups
For beginners
No investment risk and infrastructure expertise required

Web developers, or niche players


A simple, low-cost way to load and go

Experimenting
Software evaluation can be performed in the cloud, before purchase

Faster deployment of new applications


No hardware dependency and integration

Good for seasonal computing needs

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 47

Leveraging the Public cloud is often the best option for non-core business applications for SMBs, or startups and individuals, where they can quickly realize the potential cost saving benefit without spending in infrastructure. Cloud is also an attractive option for development and testing of new applications without investing in infrastructure, when you are not sure whether the project will pass the proof of concept. With the cloud options, software evaluation can be performed before purchasing licenses or support.

Cloud Computing Foundations - 47

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Path to Public Cloud


First step is virtualization of available resources
Application and infrastructure virtualization

Second step: Experiment with cloud


Prototype application to understand how it work with your environment
For example cloud backups are a great way to introduce to CC

Measure and document various matrices


Performance, billing, reliability etc.

Gain experience and educate stack holders

Next step: Gradual advancement with cloud


Build business cases to realize capex reduction and better ROI Establish polices and practices Deploy production applications
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 48

Virtualization of applications and infrastructure provide immediate cost benefit by improving utilization and reducing management expenditure. Also as a first step, virtualization provides required flexibility and independence to applications from physical infrastructure and make them portable to cloud offerings which are based on virtual infrastructure. Next step is to choose a right application, usually a non-core application to experiment with the cloud. For example, you can start with your e-mail archiving or data backup in a cloud with Mozy online. With this step, understand cloud operation and various matrices, such as performance, billing, security and bottlenecks. Once you gain sufficient experience with cloud experiment, its time to take full advantage by deploying more mature applications and processes to scale in the cloud. Establish policies and process to gradual advancement with production applications, showcase successes to drive the demand, and ultimately realize the better productivity, improved profitability throughout the IT organization.

Cloud Computing Foundations - 48

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Choosing Right Application to Start - 1


Check compatibility between platform software and application Not all the applications are good for cloud
Depends on cloud infrastructure capability & QoS Applications may suffer due to insufficient b/w, network latency Applications with stringent security requirement are unlikely to move

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 49

To access PaaS and IaaS, customers may need to migrate their proprietary or any off-the-shelf application of choice to the cloud. Two disparate considerations may arise while an organization is planning for migration. The first is cloud computing infrastructure may not support the application. This may happen due to incompatibility between platform software and application, or maybe the organization is planning to move a legacy application to the cloud. The second consideration is related to the justification of moving an application to the cloud. Not all the applications are good candidates for cloud, although it may depend on the capability of cloud infrastructure and the quality of service offered by cloud providers. For example, applications that require real time response may suffer due to insufficient bandwidth, network latency, and network congestion. Organizations having a stringent backup window should gaze at the bandwidth and latency factors before moving their backup applications to cloud. For the same reasons, graphics intensive applications and applications handling large I/O are less likely to migrate to the cloud. Also, organizations are unlikely to move their business critical applications with strict security requirement to the cloud.

Cloud Computing Foundations - 49

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Choosing Right Application to Start - 2


Candidate Applications:
Non-core applications, to avoid risk, if any Applications with unpredictable capacity/workload requirements
Spike computing applications

Application development and testing environment Any stand-alone application


Minimal integration impact

Applications where significant cost benefits can be achieved in a shorter time

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 50

Based on the considerations, various applications may be the right candidate to the cloud computing. Start with the applications which are less important to the core business operations so the risk associated with them is lower than to core systems, for example a marketing campaign web-site or any other web based environment which should not be a core business application. Applications with unpredictable workload or capacity requirements may also fit well in the cloud computing model as they are candidates of spike computing. Another environment can be application development and testing in cloud that can offer an organizations own test and development setup. These applications can provide significant business benefits, faster project time to market, no capital investment and no skills to expand or build new setup. Any standalone applications that don't interact much with other applications can also be a good fit for cloud computing.

Cloud Computing Foundations - 50

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Common Cloud Implementations - 1


Utilize applications running on cloud (offered as SaaS) Business start ups Testing Peak computing Storage related services Web hosting

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 51

This slide discusses some common use cases which reveal the indispensability of migrating to the cloud. Organizations or individuals can leverage these ideas to accomplish specific tasks by moving to the cloud, which otherwise cost them more. Consider a scenario where a single anti-virus program safeguards your organization. However, no anti-virus software guarantees hundred percent detection and most recent threats may remain undetected for several days. Also, anti-virus software themselves may be vulnerable to malicious attack. Cloud providers offer superior protection against viruses by deploying multiple anti-virus engines developed by different vendors. This new approach is called cloud antivirus or CloudAV. Suspicious files are screened simultaneously by all the anti-virus programs, hence detection capability is more than a solitary antivirus software. Come to the next scenario. Say you want to start a new business, however, you have a tight budget which restricts you recruiting people, purchasing server, storage, power and cooling units, etc. By using cloud services, you can start your business without significant investment and management cost. Organizations can leverage cloud platform service to test a new application. Many cloud providers offer a free trial period. If your organization is satisfied with the application capability, they may think of signing a contract with the cloud provider.

Cloud Computing Foundations - 51

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Common Cloud Implementations - 2


Utilize applications running on cloud (offered as SaaS) Business start ups Testing Peak computing Storage related services Web hosting

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 52

Organizations providing customer service often experience performance problems during peak season or peak hours. If they purchase additional computing resources to culminate the issue, these resources will remain vastly unutilized for the remaining year. Instead, they can hire cloud computing resources only for the peak season and terminate the service when it is over. An example of cloud storage service is the backup service. Cloud backup service providers offer online, fast and secured backup which an organization or individual can leverage by connecting their computer to the internet. Customers can monitor the backup data, logs, total capacity stored and can restore from anywhere and anytime. An organization may invest and implement e-mail systems such as Exchange on their servers. An alternative to this approach is to access web e-mail application services offered by cloud providers. They maintain web e-mail accounts, which can be accessed from anywhere across the globe. E-mail service providers either offer free service or put forward maintenance charge.

Cloud Computing Foundations - 52

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module Summary
Key points covered in this module: Cloud migration considerations Private cloud as a choice for cloud move Path to cloud migration Choosing a right application for cloud move

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 53

These are the key points covered in this module. Please take a moment to review them.

Cloud Computing Foundations - 53

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module 4: Cloud Concerns and Challenges


Upon completion of this module, you will be able to: Explain customer concerns regarding security, performance, and availability of cloud services Describe the challenges for cloud customers and service providers Discuss cloud security options

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 54

The objectives for this module are shown here. Please take a moment to read them.

Cloud Computing Foundations - 54

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Concerns - 1
Security concerns
How much control you might give up with distributed data? Is there any chance of accidental access? Will it reside in a different country? Will it be governed by different laws? Will it be in a politically unstable area/ flood plain/ earthquake zone?

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 55

Although there is growing acceptance of cloud computing, some concerns still prevail, mostly because of the fear about the privacy and security in cloud. If an organization has developed its own private cloud, the organization has complete control on its data. However things change for public and hybrid cloud, where cloud resources are managed by cloud service providers organization. Cloud service providers may have resources distributed to different countries across the world, therefore, your data can be located anywhere. There are counter arguments to these concerns. There may be agreement between cloud consumers and providers about storing user data to certain locations. When cloud users access cloud services, based on their identity and metadata information, the policy management process in the cloud defines the policy for storing specific user object.

Cloud Computing Foundations - 55

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Concerns - 2
Performance concerns
Bandwidth, network latency

Availability concerns
How can data loss and corruption be prevented? Will data be available in case of a physical failure?

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 56

Performance is another concern as a cloud user typically uses the internet for accessing cloud services. Therefore insufficient bandwidth may lead to poor application performance and may not work for real time applications. If you need to access data which is halfway around the world, the network latency may elongate application response time and may even timeout transactions. Also, the internet is shared by million of users, therefore peak hour workload may degrade application performance. Purchasing or hiring sufficient bandwidth is a remedy in this case. Cloud providers can optimize the read operation by enabling read from the same location as the client request. Objects may be read from the replica that is the fewest network hops away. Another important issue is data availability. Cloud providers set business continuity policies based on specific user or tenant to define number, location, type and frequency of backup and replication.

Cloud Computing Foundations - 56

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Challenges Customers Perspective


Network latency
Cloud resources may be many hops away from customer location Real time applications may suffer most

Data criticality and regulations


Customers are indecisive to transfer control of sensitive data Regulations may prevent organizations to use cloud services

Supportability
Customer applications and cloud platform services incompatibility
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 57

Both cloud customers and providers have their own challenges in dealing with cloud computing. The slide lists customer challenges. Network latency: Cloud customers may access cloud services from anywhere in the world. Although cloud resources are distributed, they may not be close to the customer location resulting high network latency. Network latency becomes a big issue for real time applications which might timeout a request, if the delay exceeds stipulated period. Data criticality and regulations: Each customer organization have business critical data which requires continuous access monitoring and protection. Although cloud has event logging capability, customers may not be willing to transfer control of their sensitive information. Also, many regulations impose restriction to distribute data outside the organizations territory. Supportability: Public clouds may not support all applications. For example, a customer may want to leverage cloud platform service for its proprietary applications but cloud provider may not have a compatible operating system. Also, legacy applications and old version of applications may not be supported in cloud.

Cloud Computing Foundations - 57

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Challenges Providers Perspective


Service warranty and service cost
Resources must be kept ready to meet unpredictable demand Hefty penalty if SLAs are not fulfilled Cost of providing service

Large number of software to manage


Huge number of applications and platform software to purchase ROI is unpredictable

No standard cloud access interface


Cloud customers want open APIs Need agreement among cloud providers for standardization

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 58

Lets have a look at the cloud providers challenges. Service warranty and service cost: Cloud service providers usually publishes Service Level Agreement or SLA so that their customers know about the availability of service, quality of service, downtime compensation, and legal and regulatory clauses. Alternatively, SLAs may be signed between a cloud service provider and a tenant. Cloud vendors must ensure that they have adequate cloud resources to provide required level of services. SLAs typically mention penalty amount if cloud service providers fail to provide services. As these resources are distributed and continuously scaled to meet variable demands, it is a challenge to the cloud providers to manage physical resources, and estimate the actual cost of providing the service. Large number of software to manage: Cloud providers especially SaaS and PaaS providers manages huge number of applications, all the common operating systems, and middleware software to meet the need of wide range of users. For that, they need to purchase large number software and upgrade them, whenever new version comes. The investment is huge although return on investment depends on user demand, hence it is unpredictable and at times very low. No standard cloud access interface: Cloud service providers usually offer proprietary applications to access their cloud. However, cloud customers want open or standard APIs to become tenant of multiple clouds. This is a challenge to the cloud providers because this require agreement among cloud vendors and upgrade of their proprietary applications to meet the standard.

Cloud Computing Foundations - 58

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Security Options in the Cloud - 1


Strong authentication VPN External LDAP Authorization Security domain RBAC Firewall Event logging Encryption Port lockdown OS & Application hardening Active Directory NFS/CIFS Client NIS

Cloud Service User

Cloud Access Interface

Web Browser/Web Service API


HTTP/HTTPS

Web Server Internal LDAP


2009 EMC Corporation. All rights reserved.

CIFS Server

NFS Server

Cloud Computing Foundations - 59

Cloud security is implemented using strong authentication, authorization, role based access control, event logging procedures, encrypting data at rest and in transit. Furthermore, cloud uses virtual private network, security domain, firewall, port lockdown and hardening operating systems, middleware, and application to ensure security. These procedures are also found in a datacenter, however, cloud security is an integrated approach which is established over distributed cloud resources. Cloud service users typically use web browser or web service APIs to access cloud services. Another option is to connect using a CIFS or NFS client. Web service users are authenticated by the web servers which communicates with cloud internal or external LDAP servers to collect user information. Web browsers and web service APIs provide access through HTTP or HTTPS channels and using specific port. CIFS and NFS clients are typically authenticated using the information in active directory and NIS respectively. All authentication information is encrypted before they are transferred. The user request management node is responsible for authorizing a user. It reads the access control list or ACL associated with each object to define policy of accessing a cloud resource.

Cloud Computing Foundations - 59

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Security Options in the Cloud - 2


Strong authentication VPN Authorization Security domain RBAC Firewall Event logging Encryption Port lockdown OS & Application hardening

Role Based Access Control (RBAC)


Unique ID for every user determines security principle

Firewall
Filters information based on IP address, port ID, protocol

Port lockdown
Bind MAC address to a port

OS & Application hardening


Eliminating non-essential utilities, vulnerable to attacks
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 60

Role based access control is established by allocating a unique ID to every user that represents security principle. A user can be an administrator or non-administrator. For each tenant, a specific administrator ID is generated. A user having tenant admin role can create and remove users and user ID within tenant security domain via cloud authentication service. Administrators can observe, and tenant resource configuration and status and may change the settings and tenant policy by sending self service request. Firewalls can be used in a DMZ configuration which filters information based on IP address, port ID, protocol etc. Switch can be configured to bind MAC address to a port. The port will remain disabled for other MAC address. Operating systems, middleware, and application can be hardened by eliminating non-essential utilities which are vulnerable to attacks.

Cloud Computing Foundations - 60

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module Summary
Key points covered in this module: Cloud concerns
Regarding security, performance, and availability

Cloud challenges
Cloud customers and providers perspective

Cloud security options


Strong authentication, authorization, RBAC, event logging, encryption, VPN, security domain, firewall, port lockdown, and hardening OS, middleware, application

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 61

These are the key points covered in this module. Please take a moment to review them.

Cloud Computing Foundations - 61

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module 5: EMCs Role and Strategies


Upon completion of this module, you will be able to: Discuss EMCs vision on cloud and cloud enabling technologies Detail the offerings of Virtual Computing Environment (VCE) coalition
Alliance of VMware, Cisco, and EMC to help building private cloud

Discuss the features and technical architecture of EMC Atmos, and Symmetrix VMax Discuss the role of RSA to ensure cloud security Describe the features and working procedure of Mozy

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 62

The objectives for this module are shown here. Please take a moment to read them.

Cloud Computing Foundations - 62

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

EMCs Vision and Capabilities


EMC is setting standards in industry groups
R&D for cloud products, cloud features, cloud solutions, cloud industry integration

Partnerships with Cisco and VMware to develop Virtual Computing Environment (VCE)
Consulting and implementation services to migrate to virtual data center and private cloud

Cloud specific product technology (VMax, Atmos On-line) Essential products and capabilities for cloud operation
Ionix Next Gen Management, Fully Automated Storage Tiering, deduplication

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 63

These are just examples of why EMC is in the best position to help customers achieve the benefits of private cloud. EMCs vision toward cloud computing is validated strongly by the marketplace now. EMC has a series of cloud specific technology in its portfolio. Storage is one example, Ionix is another powerful example, but the list goes on - security, continuous operations, archiving, discovery, and on and on. EMC is committed to an open approach to private cloud. That is why EMC is working closely with VMware and Cisco to accelerate private cloud, as well as continuing to work on joint technologies with other partners. That may be important for those customers that would prefer to delay building their private clouds so they can leverage other EMC partners like MSFT, Brocade, Dell, etc. EMC continues to work with these partners to help customers build the right solutions for their needs.

Cloud Computing Foundations - 63

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

EMC Enabling Technology and Expertise


EMC Consulting
Information Infrastructure Solutions Integrated with VMware RSA Security from EMC
Encryption and key management and Authentication Manager Data Loss Prevention solutions SIEM (Security Information Event Management) enVision security auditing and compliance

EMC Resource Management


vCenter plugins VMaware discovery VMaware ITIL workflows VMaware IT compliance

EMC Information Management


De-duplication for VMware SRM integrated business continuity Archiving of virtualized data Optimized vClient solutions

EMC Storage
Widest range of choices for virtualization with full VMware integration Architected to create the Single Giant Array Integrated and features: virtual provisioning, Fully Automated Storage Tiering
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 64

EMC have the technologies today to help organizations build their private cloud and get the benefits of saving money and changing ITs role in supporting the business. These are just examples, but it gives a better idea of all the work EMC has been doing to create the technologies, products, integration, and consulting capabilities needed.

Ionix

Cloud Computing Foundations - 64

EMC Consulting

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Virtual Computing Environment (VCE) Coalition


Vblock Infrastructure Package
your application your information enterprise IT resources
VMware Cloud operating system any device any where Cisco Internetwork and unified computing EMC Virtual information infrastructure
enterprise infrastructure server network storage provider infrastructure server network storage

EMC
Symmetrix V-Max CLARiiON CX4 RSA Ionix

Cisco
Nexus 1000v UCS MDS

VMWare
vSphere
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 65

To build a private cloud, three essential components are needed: a virtual information infrastructure that manages all data securely across the private cloud, a unified computing cloud internetworking layer that provides the processing power and ability to connect everything together, and a cloud operating system that abstracts resources so they can be aggregated and federated together. The Virtual Computing Environment coalition, or VCE coalition, formed jointly by Cisco and EMC with VMware, delivers the industrys first completely integrated IT offering that enables the widespread transformation to pervasive virtualization and private cloud infrastructures. The coalition combines best-of-breed virtualization, networking, computing, storage, security, and management technologies with end-to-end vendor accountability, including a seamless, industry-first collaborative support experience. Enabled by Vblock Infrastructure Packages, the coalition represents unprecedented collaboration in development, services, and partner enablement that "de-risks" the infrastructure virtualization journey of customers to private cloud implementation. In Vblock Infrastructure Package, the virtual information infrastructure is provided by EMC with EMCs Symmetrix V-Max and CLARiiON CX4 storage, secured by RSA; the unified compute and cloud internetworking layers are provided by Cisco with products like Nexus 1000v, UCS, and MDS; and the cloud operating system is provided by VMware with vSphere platform. EMC Ionix Unified Infrastructure Manager is available as the integrated element manager for Vblock.
Cloud Computing Foundations - 65

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

VCE Consulting and Implementation Services


Executive Advisory Services
Private Cloud Strategic Impact Advisory Service Cloud-based Business Advisory Service

Architecture Advisory Services


Private Cloud Architecture Impact Advisory Service Virtual Desktop Advisory Service

Cloud Computing Strategy Service Vblock Design and Implementation Service

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 66

Virtual Computing Environment Consulting and Implementation Services is comprised of the following: Executive Advisory Services, which includes Private Cloud Strategic Impact Advisory Service where the customer aligns business strategy with IT priorities and goals for private cloud; and Cloud-based Business Advisory Service where the customer can explore leveraging Cloud Solutions to drive new product and service business strategies and competitive advantages. Architecture Advisory Services includes Private Cloud Architecture Impact Advisory Service that provides a high level architectural blueprint and an estimate of the level of effort to build and operate a private cloud; and the Virtual Desktop Advisory Service that helps the customer identify the key business challenges Virtual Desktop Infrastructure would address. Cloud Computing Strategy Service offers customers a strategic plan for transforming existing infrastructure to the private cloud, rationalizes and targets applications best suited for the private cloud, realigns current IT operating models and builds a business case and roadmap to move to the private cloud. Vblock Design and Implementation Service provides customers with a project plan, technical design, implementation, validation test, and solution transfer to the client.

Cloud Computing Foundations - 66

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Building Virtual Information Infrastructure - EMC V-Max

More Performance
More Front End & Back End IOPS, Increased Systems Bandwidth, More Usable Global Memory

Faster Provisioning
Auto Provisioning Groups reduces configuration steps for initial set up and future changes

More Capacity
Up to 2PB of Usable Capacity, Larger volumes (256GB), More hyper volumes (512/disk)

Faster Data Mobility


New Virtual LUN capabilities enables thousands of concurrent volume migrations

More Connectivity
Twice as many host ports More IOPS per port More initiators per port (256)

Revolutionary Virtual Matrix Architecture


The Worlds First Scale-Out Enterprise Storage Array

Faster Local Replication


Faster Copy Updates reduces time to complete TimeFinder Clone operations

Less Power per TB


Reduced Power and Cooling requirements via multi-core and new system packaging

More Affordable Distance Replication


SRDF/EDP reduces infrastructure costs for multi-site and extended distance replication requirements

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 67

EMC Symmetrix VMax storage is purpose-built for virtual information infrastructure. V-Maxs Enginuity operating system provides several advanced features, such as Auto-provisioning Groups for simplification of storage management, Virtual Provisioning for optimization of available storage capacity, and Virtual LUN technology for non-disruptive optimization of available storage protection levels. All of the industry-leading features for Business Continuation and Disaster Recovery have been the hallmarks of EMC Symmetrix storage arrays for over a decade, and continue in the V-Max. The replicated components, which comprise every V-Max configuration, assure that no single point of failure can bring the system down. The hardware and software architecture of the Symmetrix V-Max storage array allows capacity and performance upgrades to be performed online with no impact to production applications. In fact, all configuration changes, hardware and software updates, and service procedures are designed to be performed online and non-disruptively. This ensures that customers can consolidate without compromising availability, performance, and functionality, while leveraging true pay-as-you-grow economics for high-growth storage environments.

Cloud Computing Foundations - 67

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Virtual Matrix Architecture

Virtual Matrix
Symmetrix VMax Storage Engine

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 68

EMC Symmetrix V-Max puts forth a radical new architecture based on a Virtual Matrix design. The V-Max leverages multi-core Intel chips that provide more robust building blocks called VMax Engines. Each V-Max Engines includes four quad-core Intel Xeon processors, 64-128 GB of Global Memory; 8-16 ports for front-end host access or Symmetrix Remote Data Facility channels using Fibre Channel, FICON, or Gigabit Ethernet; and 16 back-end ports connecting to up to 360 storage devices using 4Gb Fibre Channel, SATA or Enterprise Flash Drives. Each VMax engines includes two redundant director modules providing parallel access and replicated copies of all critical data. The Virtual Matrix will support a total of eight V-Max Engines in a single system. Symmetrix V-Max can include two to 16 directors inside one to eight V-Max Engines. Each V-Max Engine has its own redundant power supplies, cooling fans, SPS Modules, and Environmental Modules. Furthermore, the connectivity between the Symmetrix V-Max array engines provides direct connections from each director to every other director, creating a redundant and high-availability Virtual Matrix.

Cloud Computing Foundations - 68

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Role of RSA, the Security Division of EMC - 1


RSA Key Manager Suite RSA SafeProxy RSA Federated Identity Manager RSA Access Manager RSA Identity Verification

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 69

RSA, the security division of EMC and pioneer in devising many data security solutions, publishes the best practices for protecting enterprise data and user identities in cloud. RSA Key Manager Suite is an enterprise encryption key management system designed to manage encryption keys at the application, database and storage layers. The RSA SafeProxy architecture employs a unique combination of tokenization, advanced encryption and public-key technologies to protect sensitive data with a layered approach to security. RSA Federated Identity Manager is cloud-ready, flexible identity federation solution that uses the latest web services standards to enable enterprises to securely exchange user identities between internal business units and with customers and partners. RSA Access Manager gives legitimate users single sign-on access to applications within intranets, extranets, private clouds and exchange infrastructures. It allows organizations to manage large numbers of users while consistently enforcing a centralized security policy, ensuring compliance and protecting organizational resources from unauthorized access. RSA Identity Verification provides knowledge-based authentication for the initial registration process, asking users to verify their identities by answering questions based on information obtained from public records and commercially available sources. The answer choices presented by RSA Identity Verification are unique to each individual and greatly reduces the likelihood that someone other than the genuine user can provide the correct responses. The system can be configured to address high-risk identities or transactions by adjusting the difficulty of the questions during the authentication process.
Cloud Computing Foundations - 69

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Role of RSA, the Security Division of EMC - 2


RSA SecurID RSA Adaptive Authentication RSA eFraudNetwork FraudActionSM RSA enVision log management platform RSA Data Loss Prevention

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 70

The RSA SecurID solution is the gold-standard in two factor authentication. Its hallmark is a security token, either a physical device such as key fob or USB, or a software token stored in mobile phone that generates a new authentication code every 60 seconds. RSA Adaptive Authentication is a risk-based, multifactor authentication platform providing strong protection for Web portals, SSL VPN applications and cloud access management solutions. It measures over one hundred risk indicators to identify high-risk and suspicious activities. The RSA eFraudNetwork service is the industry's first and largest online fraud network dedicated to identifying and sharing information on fraudulent activity. RSA FraudActionSM service is a market-tested, managed service to defend from online phishing, pharming and Trojans attacks. The RSA enVision log management platform provides collection, alerting and analysis of log data that enables organizations to simplify compliance and quickly respond to high-risk security events. The RSA enVision 3-in-1 platform offers an effective security and information event management (SIEM) and log management solution, capable of collecting and analyzing large amounts of data in real-time, from any event source and in computing environments of any size. The RSA enVision platform is easily scalable, eliminating the need for filtering and to deploy agents. The RSA Data Loss Prevention (DLP) Suite provides a policy-based approach to securing data in data centers, networks and end points, enabling customers to classify their sensitive data, locate and track data across the enterprise, enforce controls, and report and audit activities to ensure policy compliance.
Cloud Computing Foundations - 70

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Storage Solution EMC Atmos


First multi-petabyte information management offering
To manage and optimize cloud storage infrastructure

Features
Policy based management Massive scalability Multi-tenancy Object based storage Multi-protocol support Federation
Servers

Disk Enclosure
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 71

EMC Atmos is the first multi-petabyte information management offering designed to help customers automatically manage and optimize the delivery of rich, unstructured information across large-scale, global cloud storage environments. Atmos is policy-based information management software packaged and delivered to customers with a low-cost, high-density storage system that offers ease of implementation and service. The main features of Atmos are as follows. Policy-based management and data distribution, which allows users to determine where content is delivered and what actions to take to manage that information. Policies leverage metadata to determine performance and availability requirements, such as how data is protected, for how long, with how many copies, and where it can be stored geographically to best meet performance and availability requirements. Atmos can theoretically scale performance and capacity infinitely within a unified namespace. A unified namespace enables Atmos to scale massively, while still operating as a single entity. Multi-tenancy is the conceptual grouping of resources to enable robust reporting and resource management, supporting millions of users. Object-based storage allows associating a tag or object ID to the content and using those data tags to apply policies, improve searches, or build custom queries. Atmos supports web services via REST and SOAP, as well as legacy protocols such as CIFS, NFS, and IFS. Federation, which moves content from an private cloud to any public Atmos based cloud, via Atmos onLine. EMC Atmos onLine is a storage as a service offering that is operated and managed by EMC. This service is built upon EMC Atmos technology.

Cloud Computing Foundations - 71

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

EMC Atmos Hardware Configuration


Server based JBOD
Runs Atmos software

Specification
Dell 1950 server LSI 3801 SAS controller 4GB fully buffered DIMM (FBD) memory Costefficient, native SATA drive Wide SAS ports Two 1Gb Ethernet ports Upto 360 TB total capacity GbE or 10GbE connectivity
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 72

Atmos hardware is a server based JBOD storage platform that is optimized to run Atmos software. Atmos hardware includes 1U Intel based Dell 1950 servers with an LSI SAS HBA that provides the connection to SATA disks. Customers connect to the Atmos system over gigabit Ethernet ports, or 10 gigabit Ethernet ports based on switch configurations. Data protection is accomplished with data replication on multiple servers. The system does not require or support RAID for customer data; data is protected by redundant copies. Disk configuration is based on ratios of 1:15 or 1:60 per cabinet. No RAID is used, so 15 or 60 physical disks are presented to the operating system. A server failure causes the system to lose access to all drives. There is no caching so there is no potential for data loss.

Cloud Computing Foundations - 72

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Atmos Technical Architecture


Applications
Client Services

Presentation
Linux FS NFS/CIFS SOAP REST

Web services client library

Object based cloud optimized storage access interface


Core Services

Data Storage Service

Metadata Location Service

Resource Manager Service

Metadata Service

Management Services

System Manager Service

Security Manager Service

Policy Manager Service

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 73

This slide details the Atmos technical architecture. Client service is the front-end for applications and any object interaction with cloud storage. It offers two interfaces or presentation layers: File access interface using NFS, CIFS, or Linux installable file system interface, and web services interface using SOAP, and REST. Cloud optimized storage access interface allows object level communication with the core services. It maps application interfaces to object services and provides views of cloud optimized storage to the applications, based on the object metadata. Core services include metadata service, resource manager service, and metadata location service. Any object entering the storage cloud arrive at the metadata server. Metadata service processes the object metadata and passes service level objectives to the resource and policy manager. Metadata service executes user requests to create, update, and destroy objects. Also, it tracks multiple versions and replicas of an object. Metadata service provides input to the resource manager which tracks the status, resource membership, availability, and space of each data storage service. Metadata location service tracks metadata servers within the cloud and maintains the location of objects associated with each metadata server. Client services queries metadata location service to identify the metadata server for an object. Data storage services responds to client access requests and is responsible for storing and retrieving objects from cloud storage. They expose their capabilities and state to the resource manager. Management services incorporate system manager service, security manager service, and policy manager service. Policy manager defines policy for storing each object based on service level objectives and the object metadata. Security manager enforces cloud storage security services when an object is accessed whereas system manager is responsible for monitoring and managing physical storage systems.

Cloud Computing Foundations - 73

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Video - EMC Atmos

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 74

Click on the link to view the EMC Atmos video.

Cloud Computing Foundations - 74

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Backup Service - Decho Mozy - 1


2GB absolutely free forever Unlimited personal backup Mac and Windows support

For individual consumer looking for online, automatic, secured, costeffective way to backup
Photos, music, document

Secure online backup for businesses Server and network share support Web-based administration

Dedicated to companies looking for online, secured, automatic, costeffective way to backup
Ideal for enterprise and remote office environments
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 75

Mozy is a Software as a Service solution, built on a highly scalable and available backend storage architecture. Mozy customers can leverage the Mozy console to perform automatic, secured, online backup and recovery of their data with ease. Mozy is owned by Decho Corporation, which is an EMC company. Mozy has two main products MozyHome and MozyPro. MozyHome is for the individual consumer looking for a cost-effective way to backup all their data such as photos, music, and document. MozyPro is dedicated to companies looking for a cost-effective way to backup end users company data and have an administrative console available to manage their users and how and what they backup. MozyPro offers secure, automatic offsite backup for your desktops, laptops, and Microsoft Windows servers. Ideal for enterprise and remote-office environments, MozyPro may be configured, deployed, and centrally managed via a web-based, multitenant administrative console accessible from anywhere in the world. This low-cost software is available as a monthly subscription service, requires no hardware purchase, and may be managed with minimal IT resources.

Cloud Computing Foundations - 75

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Backup Service - Decho Mozy - 2

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 76

MozyPro customers have a private encryption key option, 24x7x365 phone support and an intuitive web-based administrative console for centralized management from anywhere in the world. This central management tool allows a business to set up clients and users, deploy the backup software, and manage the service from any location. Additionally, the MozyPro admin console offers features such as automatic parameters, backup scheduling, email alerts, bandwidth throttling, and status reports. Mozy provides the end user multiple ways to retrieve their lost data, the easiest option being Right-click. Users can right-click in any folder, click on the Mozy icon, and see all the files that have been backed up and easily restore it to any location. Mozy also creates a virtual drive in My Computer that allows the user to see all of the folders they have backed up in a familiar Windows Explorer environment. Similar features available for Mozy Mac clients with Mac operating system. Mozy also provides a web interface so that users can login and restore from their account. DVD and hard drive restores are also available upon request. The real benefit of Mozy is providing your users the ability to get back to 100% productivity as quickly as possible. For example, a sales executive is traveling to an important meeting with a prospective customer. On the way through the airport, his laptop is stolen or lost. The presentation he was to give was only on that laptop. If that sales executive had been backing up with Mozy, he could go to any internet enabled computer, log into his Mozy.com account and request a recovery of that presentation within minutes.

Cloud Computing Foundations - 76

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

How MozyPro Works - 1


Customer signs up for MozyPro via EMC Partner Customer administrator logs into MozyPro website and sets backup and retention policies
what is and what is not backed up scheduling, and user quota encryption strategy
448-bit OpenSSL (Blowfish) 256-bit AES

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 77

Once a customer signs up for Mozy, they are brought to their admin console where they can build custom backup and retention policies. MozyPro gives the administrator the ability to lock down exactly what is and what is not backed up in their environment, scheduling, and user quota. The administrator can also choose what type of encryption strategy they want to use. MozyPro uses two types of data encryption. The first method uses the OpenSSL implementation of the keyed, symmetric block cipher known as Blowfish. This method encrypts data with a 448bit key that is automatically generated during installation. The second method uses 256-bit AES encryption, which enables customers to specify a personal key known only to them and only stored only at their location. In addition to data encryption, all communications between customer computers and MozyPro servers are encrypted using a certified 128-bit SSL connection with two-way certificate verification.

Cloud Computing Foundations - 77

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

How MozyPro Works - 2


Customer signs up for MozyPro via EMC Partner Customer administrator logs into MozyPro website and sets backup and retention policies Lightweight agent runs on chosen servers or desktops / laptops to be backed up Data is encrypted at customer site and then automatically backed up over the internet to EMC managed storage location
Customer has encryption keys

Customer has complete visibility to backups, logs, total capacity stored and can restore as required
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 78

Once the policies are determined, a lightweight agent is sent out and installed on each machine. As the initial backup begins, the agent scans the machine for all backup sets matching the administrators configuration, encrypts each individual file and sends them to the Mozy datacenter, where it remains encrypted. User can also select a specific folder and schedule to backup their files within the space allocated for the user. MozyPro backup process authenticates the client with the Mozy remote servers by validating the username and the password, as well as using the access control list or ACL that grants access to appropriate account. The first encryption process uses a symmetric key embedded in the Mozy client, and the second process uses Windows cryptographic services, utilizing a system-specific key stored in the Local Security Authority (LSA). For each additional backup, Mozy no longer needs to scan the hard drive. The agent simply keeps track of all changes and sends those incremental changes during the next backup. This minimizes CPU and bandwidth on all subsequent backups. The administrator can keep track of all backup activity via his web-based console.

Cloud Computing Foundations - 78

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module Summary
Key points covered in this module: VCE - Strategic alliance of three industry leaders
To help customers build private cloud
VMware Cloud OS Cisco Internetwork and unified computing EMC Virtual information infrastructure

RSA solutions toward cloud security EMC Atmos, Symmetrix VMax - Cloud storage solution
Features, technical architecture

Decho Mozy - EMCs backup as a service offering


MozyPro, MozyHome
Features and working procedure
2009 EMC Corporation. All rights reserved. Cloud Computing Foundations - 79

These are the key points covered in this module. Please take a moment to review them.

Cloud Computing Foundations - 79

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module 6: Cloud Computing Future and Vision


Upon completion of this module, you will be able to: Describe the prospect of cloud computing following IDC forecast Discuss how cloud computing fits into the technology adoption lifecycle model
Moores chasm

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 80

The objectives for this module are shown here. Please take a moment to read them.

Cloud Computing Foundations - 80

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Computing Forecast IDC Report


Year Total IT spending CC spending CC spending as percentage of total IT spending 2008 $383B $16B 4% 2012 $494B $42B 9%

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 81

Cloud computing, although in its infancy, is gaining popularity because both cloud customers and providers are seeing it as an opportunity to flourish their businesses. Industry analyst IDC has sent out a report which projects the growth of cloud computing in the year of 2012. IDC says cloud computing is starting to transform how IT will be spending its money over the next few years. In 2008, cloud computing accounted for $16 billion or 4% of the total $383 billion spent by IT. IDC is forecasting a rise of 9% of the $494 billion to be spent by IT in 2012, which is almost three times the spending in 2008. The diagram shows the predicted cloud services spending in five core sectors, both in 2008 and 2012. Among these services, business applications top the list with 57% in 2008 and 52% in 2012. The forecast discloses that cloud storage service spending will make a significant leap from 5% of cloud service spending in 2008 to 13% in 2012. According to IDC, with 9% of cloud computing spending in 2012, cloud services growth will equal 25% of the industrys yearly growth in these five service sectors. Projecting the same growth rate, the year 2013 will observe one-third of the IT industrys net growth in cloud services.

Cloud Computing Foundations - 81

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Cloud Computing - Where Are We? - Moores Chasm

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 82

Geoffrey Moore proposed a revised technology adoption lifecycle model, as shown in the slide. Rather than a totally smooth curve, he argues that there are gaps in the curve. The largest one is between the early adopters and the early majority, marked as a chasm in the diagram. Summarizing his book, Jonathan Linowes writes that some companies cross over the gap in the curve while others get locked in time. Cloud computing falls into this model, but it is hard to pin down where computing is on the curve. Many people believe it is existing in the chasm between the early adopters and the early majority. According to Moore, early adopters are visionaries "who have the insight to match an emerging technology to a strategic opportunity, driven by a 'dream'. The core dream is a business goal, not a technology goal, and it involves taking a quantum leap forward in how business is conducted in their industry or by their customers Visionaries drive the high-tech industry because they see the potential for an 'order-of-magnitude' return on investment and willingly take high risks to pursue that goal. .. Geoffreys definition of the early majority is "they care about the company they are buying from, the quality of the product they are buying, the infrastructure of supporting products and system interfaces, and the reliability of the service they are going to get.. A company on this part of the curve may not be open to the benefits of cloud computing because of the value they place on references and relationships. Cloud computing is impressive, but because it is not yet adopted, customers are unsure of it.

Cloud Computing Foundations - 82

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Module Summary
Key points covered in this module: IDC forecast about cloud computing
Predicted growth in 2012 and 2013

Cloud computing falls into Moores revised technology adoption lifecycle model
Cloud computing is existing in the Moores chasm

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 83

These are the key points covered in this module. Please take a moment to review them.

Cloud Computing Foundations - 83

Copyright 2009 EMC Corporation. Do not Copy - All Rights Reserved.

Course Summary
Key points covered in this course: Definition, benefits, services, and types of cloud computing Cloud infrastructure and its components Considerations and process of migrating to cloud Concerns and challenges with cloud computing EMC positioning and products for cloud computing Prospect of cloud computing

2009 EMC Corporation. All rights reserved.

Cloud Computing Foundations - 84

These are the key points covered in this training. Please take a moment to review them. This concludes the training. Please proceed to the Course Completion slide to take the assessment

Cloud Computing Foundations - 84

Potrebbero piacerti anche