Definitions of Cloud Flashcards
SAAS
Software as a Service
Risk Mitigation - Reduced local admin and redundancy
Business Continuity - 24/7 access from any location that has internet, synchronization between local and cloud, doesn’t have to go through email
Efficiency -
Deployment - rapidsimplified data retention and admin is the resposibility of CSP
Hardware Resources -economies of scale, don’t have to pay for upgrades, etc, give flexibility and agility
Cost - based on usage, minimal up front costs, pay as you go.
Scalability - easily scale up or down the storage as they needcan be allocateda nd de-allocated dynamically. Can run slower than an inhouse solution due to redundancy and connection
PAAS
Platform as a Service (Ability to create a testing environment, etc for development)
MAAS
Management as a Service - ability to see status of systems, etc basically monitoring
CAAS
Communication as a Service
IAAS
Infrastructure as a Service - lease hardware, software automatic patch updates
Storage as a Service
lease storage for data warehousing
Security as a Service
lease security services
CAPEX
Capital Expense which ar ecosts associated with acquisition of assets or upgrading existing assets, such as hardare
OPEX
Operational expense refers to the costs associated with the dat to day running of a copany, ie: bandwidth, etc. can be reoccuring expenses,
Traditional Internal IT Infrastrucutre
own server room own infrastructure inhouse
Colocation Facility
owned by a third party that rents out space equipped for housing and running IT infrastructure, also provide network connectivty, backkup power, physical security
Managed Services
package for full outsourcing of IT Infrastructure. instead of purchasing in colocation you rent the infrastructure, software, hardware and database management
Public Cloud
fully outsourced solutions for infrastructure, instead of renting physical harware you rent a virtual coputing environment hoste don shared server clusters in the service provider’s datacenter
Abstraction
system implementation are hidden from the user, applications run on unspecified physical systems and dat is tored in inknown locations ot the end user
VMM
Virtual machine monitor aka hypervisor
VIM
a toll that communicates with multiple hosts and their VMs, allowing for centralized admin and efficient operation of the virutal infrastructure ie: OpenNebula
Virtual platform
VMware Vsphere, Citrix XenServer or Microsoft Hyper V
3 types of virtualization
client
server
storage
Application Packaging Virtualization
method of isolating a specific application from the underlying opertaing system. application can’t modify or interact with o/s. provides protection agaist viruses and malware and you can run incompatible applications on a system
Application Streaming Virtualization
type of client virtualization. hosts necessary applications on servers in a datacetner, and then loads on client demand as if it were locally installed. Also can be used to preven unauthorized software installations from end users
Hardware Emulation Virtualization
Virtualization software is installed on the client o/s
Hypervisor
is a program that allows multiple o/s systems to share a single hardware host, each os appears to hav ethe host’s resources ie: processore, memeory, nic etc all to istself
Hypervisor Type 1
runs directly on top of hardware, provide less overhead and smaller footprint so run more efficiently and also have direct access to hardware resources
Hypervisor Type 2
run ontop of existing o/s software, ie: microsoft virtual server and vmware workstation
DAS
direct attached storage is a traditional storage method and works by connecting hard drives to an actual server
NAS
Network attached storage uses a dedicated storage devicewhich you attach to yoru network. can be scalable, configured to provide redundancy. uses standard protocols to connect to your servers
SAN
Storage Access Netowrk - dedicated hardware and software on a dedicated high performance network to createa more effective data storage solution that less prone to dataqt outages, host bus adapter or HBA connects a server to a fibre SAN
economies of scale
lowering of costs due to an increase in the scale of operations or production
vmware
Has a small footprint and is not dependent on any os to run corrrectly
Citrix Xne Server
Simplifies and speeds up management of the entire application lifecycle
Hyper V
Using os clustering it provides high availability for hosts and their vms
IBMS z/vm is a hypoervisor
which is designed to allow the clients to run hundreds to thousands of linux servers on a single mainframe running with other system z oeprating systems
Core Network
Provides a logical center point in a datacenter
Edge Network
Enables end users to connect to a datacenter
Access netwrok
Enables connections to storage networks and computing resources
Basic Public Internet
end user, most common way of accessing cloud datacenters. cusotmers access the cloud using their own internet connectiosn, sometimes time requirements cannot be met
Accelerated internet
is a set of services and offloads you can add to a standard public internet connection to improve performance, SSL termination and TCP connetion magmt
Optimized Internet overlay
lets users access a cloud via the publick internet with connetivity enhanced at the provider’s points of presence or POPs
site to site vpn
direct connection between a csp and the cloud thorugh a private wan
SOA
Service Oriented Architecture is a distributed system architecture in which services interact using a common defined interface, a collection of related sub-systems, it addresses services, data and processes in an IT architecture
SOA has 4 main benefits
functionality reuse
agility
monitoring
extensibility
Common SOA Architectures
Peer to Peer client Srever Three Tier nTier Tightly coupled Loose coupling
Loose copling
enables you to build update or replace individual participants in a system without changing the participants that intract with it
makes system more reliable
Loose coupling techniques
asynchronous communication where possible
human readable Unifrom Resoruce Idnetifiers or URLs for service and instance addresses
stateless messaging
vendor and platform independent messages
self-describing messages
well-defined extensible interfaces
SOA provides to cloud
testing of a service oriented environment
provides a deployment framework for cloud computing
I enables re-use of the code for particular functions
It provides a high degree of agility
planning cloud deployment involves 3 steps
Perfomring a data analysis
identifying and documenting services
determining future cloud architecture
data analysis consists of 3 things
where data in your organization is locted
what form the data takes
how the data flows through the neterprise and how it relates to core services and business processes
1st step in architectural foundations for good cloud computing begins with
a development of a service directory, which lists the individual services and organization uses
Service diretory
define each hardware scope design dependencies service levels security testing
Process model
link process to the service it uses
defines business processes and how they link to services
steps of migrating data to a cloud
- Establishing where the data is , what form it takes and how the data flows
- Doucmenting each serivce in the organizaiton’s baseline architecture
- Groupiing the services into processes that map to the organization’s business processes
- Identifying processes and the services that can be hosted on the cloud
Coupling
loosely connected , independence of location, off site hosting , dynamic service discouvery
Participant Interfaces
participants that have welldefined interfaces are favorable for a cloud platform. architecture mixture of locally hosted and cloud based systems
Security
root secuirty keys and credit card numbers shouldn’t be transmitted over apublic network.
SAAS Factors to consider before using
Security - Each company has there own, no set standards yet so make sure lines up with company security protocols and guidelines
Liability - SLA’s - contract negotiated liablility
reliability - is the csp dependable, reputable, what do you do if they close their doors, etc. solution is to use more than one provider.
SAAS Providers
Box.net Amazon Simple Storage Service or S3 Internap XIP Cloud Nirvanix DropBox
Storage as a Service vs SAAS
SAAS - usually block storage over Ip
Cloud Stoage and also include file-based systems.
SAAS Governance
Enterprise Risk Legal Issues Compliance Information LifeCycle Portability and Interoperability
DAC
authentication and authorization access of data, need to have someone assigned to setup access and removal
Data Classification
foundation of information security programs, it requires you to evaluate and then classify company data accourding ot its security needs. ie: confidential data may have to be encrypted, or you decided to keep it in house while allowing other types of data to go to the cloud. etc.
Accounting and Auditing
to ensure confidentiality is maintained the csp needs to have appropriate logging adn monitoring facilities for accounting and auditing purposes. This usually means that some form of security info and event magmt system mus tbe in place.
Additionally procedures need to ensure that a separation of duties exists between those who adminiser the sytems and those who monitor the logs within the csp.
Encryption of stored data
auditing and key management and key chages are needed to ensure compliance to security on the csp, can call for more administrative activiites and possibly more cost
Encryption of data in transit
encryption or tunneling may be required. depends on the sensitivity of the data and the security compliance.
OGF
Promotes standardization of distributed high performance computing applications
Open Grid Forum
meets each year grid computing worldwide
Standardizing applied distributed computing environments