Академический Документы
Профессиональный Документы
Культура Документы
1
Copyright 2011, MBL@CS.NCTU
Outline
Introduction Cloud Computing Issues Dynamic Resource Allocation and QoS Cloud Security Cloud Networking Mobile Cloud Computing Future of Cloud Computing Conclusions
2
Copyright 2011, MBL@CS.NCTU
Introduction
3
Copyright 2011, MBL@CS.NCTU
Introduction Clouds
I questioned a boy under the pine trees. My Master went herb-gathering he says: He is still somewhere on the mountain-side, So deep in the clouds I cant tell where.
Tang Poems Jia Dao Translated by Innes Herdan
Introduction
5
Copyright 2011, MBL@CS.NCTU
Introduction Clouds
I walk to where the stream dwindles And sit watching the clouds rise up and up
Tang Poems Wang Wei Translated by Innes Herdan My Country Retreat on South Mountain
6
Copyright 2011, MBL@CS.NCTU
Introduction - Clouds
Source: L.L. Peterson and B.S. Davie, Computer Networks: A System Approach, 4th Ed., Morgan Kaufmann, 2007
7
Copyright 2011, MBL@CS.NCTU
Introduction - Clouds
central office telephone network Internet
home PC
Source: J.F. Kurose and K.W. Ross, Computer Networking: A Top-Down Approach, 5th Ed., Addison-Wesley, 2010
8
Copyright 2011, MBL@CS.NCTU
9
Copyright 2011, MBL@CS.NCTU
10
Copyright 2011, MBL@CS.NCTU
Source: Nicholas G. Carr, The big switch: rewiring the world, from Edison to Google, 2008
13
Copyright 2011, MBL@CS.NCTU
14
Copyright 2011, MBL@CS.NCTU
Introduction Virtualization
Virtualization is the idea of partitioning or dividing the resources of a single server into multiple segregated VMs (virtual machines) A VM is a software implementation of a machine (i.e., a computer) that executes programs like a physical machine
Source: L. Gillam et al. (eds.), Cloud Computing: Principles, Systems and Applications, Springer, 2010
15
Copyright 2011, MBL@CS.NCTU
Introduction Virtualization
Source: L. Gillam et al. (eds.), Cloud Computing: Principles, Systems and Applications, Springer, 2010
16
Copyright 2011, MBL@CS.NCTU
17
Copyright 2011, MBL@CS.NCTU
Source: http://en.wikipedia.org/wiki/Cloud_computing
18
Copyright 2011, MBL@CS.NCTU
19
Copyright 2011, MBL@CS.NCTU
20
Copyright 2011, MBL@CS.NCTU
21
Copyright 2011, MBL@CS.NCTU
22
Copyright 2011, MBL@CS.NCTU
23
Copyright 2011, MBL@CS.NCTU
24
Copyright 2011, MBL@CS.NCTU
Essential Characteristics
Service Models
Deployment Models
Public
Private
Hybrid
Community
http://www.csrc.nist.gov/groups/SNS/cloud-computing/index.html
Cisco Confidential Copyright Copyright 2009 Cisco Systems, Inc. All rights reserved. 2011, MBL@CS.NCTU Internet Business Solutions Group
25
26
Copyright 2011, MBL@CS.NCTU
27
Copyright 2011, MBL@CS.NCTU
28
Copyright 2011, MBL@CS.NCTU
29
Copyright 2011, MBL@CS.NCTU
30
Copyright 2011, MBL@CS.NCTU
31
Copyright 2011, MBL@CS.NCTU
32
Copyright 2011, MBL@CS.NCTU
Source: http://en.wikipedia.org/wiki/Cloud_computing
33
Copyright 2011, MBL@CS.NCTU
34
Copyright 2011, MBL@CS.NCTU
35
Copyright 2011, MBL@CS.NCTU
36
Copyright 2011, MBL@CS.NCTU
37
Copyright 2011, MBL@CS.NCTU
38
Copyright 2011, MBL@CS.NCTU
39
Copyright 2011, MBL@CS.NCTU
41
Copyright 2011, MBL@CS.NCTU
43
Copyright 2011, MBL@CS.NCTU
Cloud Security
Data Protection Data from one customer must be properly segregated from that of another Identity Management Cloud providers either integrate the customers identity management system into their own infrastructure, or provide an identity management solution of their own
44
Copyright 2011, MBL@CS.NCTU
Cloud Security
Physical and Personal Security Providers ensure that physical machines are adequately secure and that access to these machines as well as all relevant customer data is not only restricted but that access is documented Application Security Cloud providers ensure that applications available as a service via the cloud are secure
45
Copyright 2011, MBL@CS.NCTU
Cloud Security
Privacy Providers ensure that all critical data (credit card numbers, for example) are masked and that only authorized users have access to data in its entirety
46
Copyright 2011, MBL@CS.NCTU
Cloud Networking
Current data centers follow a common network architecture, known as the three-tier architecture At the bottom level, known as the access tier, each server connects to one (or two, for redundancy purposes) access switch Each access switch connects to one (or two) switches at the aggregation tier Finally, each aggregation switch connects with multiple switches at the core tier
47
Copyright 2011, MBL@CS.NCTU
Cloud Networking
Figure 4 shows a layer-2 topology with 16 servers and one VLAN (labeled as Tree) Scaling the three-tier architecture is achieved by scaling up each individual switch, i.e. by increasing its fan-out, rather than scaling out the topology itself For example, the core tier can accommodate 8 switches at most
48
Copyright 2011, MBL@CS.NCTU
49
Copyright 2011, MBL@CS.NCTU
Cloud Networking
VL2 is a new architecture that shares many features with the tree It is a 3-tier architecture with main difference that the core tier and the aggregation tier form a Clos topology, i.e. the aggregation switches are connected with the core ones by forming a complete bipartite graph
50
Copyright 2011, MBL@CS.NCTU
Cloud Networking
PortLand (Fat-Tree) is another three-tier architecture that shares with the VL2 the same Clos topology feature, though at different levels The PortLand architecture makes use of fat-tree topologies and it is built around the concept of pods: a collection of access and aggregation switches that form a complete bipartite graph, i.e., a Clos graph
51
Copyright 2011, MBL@CS.NCTU
Cloud Networking
BCube is a new multi-level network architecture for the data center with the following distinguishing feature Servers are part of the network infrastructure, i.e., they forward packets on behalf of other servers
52
Copyright 2011, MBL@CS.NCTU
53
Copyright 2011, MBL@CS.NCTU
54
Copyright 2011, MBL@CS.NCTU
Conclusions
Cloud computing is a powerful way to provide scalable on-demand computing resources Virtualization technology is foundational to cloud computing because it provides a safe and flexible platform Gartner predicts that by 2012, 80 percent of Fortune 1000 enterprises will be paying for some cloud computing services, and 30 percent will be paying for cloud computing infrastructure services
55
Copyright 2011, MBL@CS.NCTU
Conclusions
Efficient dynamic resource allocation with QoSawareness and in cloud computing we trust (secure cloud computing) are keys to success and spread of cloud computing Redesigning scalable data center networks is driven by the desire to reduce cost while simultaneously handling an ever-increasing amount of the traffic between servers
56
Copyright 2011, MBL@CS.NCTU
Conclusions
The smartphone, equipped with gaming, social networking, photography, health, banking & payments, learning, productivity, is fueling the mobile phone industry growth Mobile Cloud Computing will definitely leverage the mobile handsets to the level of Super Duper Smart
57
Copyright 2011, MBL@CS.NCTU
Conclusions
Every cloud has a silver lining In every bad situation there is an element of good
58
Copyright 2011, MBL@CS.NCTU
References
[1] http://en.wikipedia.org/wiki/Cloud_computing [2] http://www.csrc.nist.gov/groups/SNS/cloudcomputing/index.html [3] Peter Mell and Tim Grance, http://csrc.nist.gov/groups/SNS/cloudcomputing/cloud-def-v15.doc [3] Ying Chen et al., Cloud Computing Strategy (in Chinese), CommonWealth, 2010 [4] L. Gillam et al. (eds.), Cloud Computing: Principles, Systems and Applications, Springer, 2010 [5]BP, , 2010 59
Copyright 2011, MBL@CS.NCTU
References
[6] A. Chandra, W. Gong and P. Shenoy, Shenoy, Dynamic Resource Allocation for Shared Data Centers Using Online Measurements, ACM SIGMETRICS03, pp. 300300-301, June 2003 [7] http://en.wikipedia.org/wiki/Cloud_computing_security [8] X. Meng, Meng, V. Pappas, and L. Zhang, Improving the Scalability of Data Center Networks with TrafficTraffic-aware Virtual Machine Placement, IEEE INFOCOM, 2010 [9] http://itmanagement.earthweb.com/netsys/print.php/ 3922856 [10] http://shahneil.com/2010/03/cloudshttp://shahneil.com/2010/03/clouds-smartphonessmartphonesrainmaking/ 60
Copyright 2011, MBL@CS.NCTU