- Software as a Service (SaaS)
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Broad network access
- On-demand self-service
- Resource pooling
- Measured service
- Rapid elasticity
The best way to start
 with that is to compare it to traditional IT computing. Where on-premises on
 our own networks, we would at some point have a capital investment in
 hardware. So think of things like having a server room constructed, getting
 racks and then populating those racks with equipment. With things like telecom
 equipment, routers, switches, servers, storage arrays, and so on. 
Then, we have to
 account for powering that equipment. We then have to think about HVAC,
 heating, ventilation and air conditioning, to make sure that we've got optimal
 environmental conditions to maximize the lifetime of our equipment. 
Then there's
 licensing. We have to license our software. We have to install it, configure
 it and maintain it over time, including updates. So with traditional IT
 computing, certainly there is quite a large need for an IT staff to take care
 of all of our on-premises IT systems. 
But with cloud
 computing, at least with public cloud computing, we are talking about hosted
 IT services. Things like servers and related storage, and databases, and web
 apps can all be run on provider equipment
 that we don't have to purchase or maintain. So in other words, we only pay for the services that are used.
 And another part of the cloud is self-provisioning,
 where on-demand, we can provision, for example additional virtual machines or
 storage. We can even scale back on it
 and that way we're saving money because we're only paying for what we are
 using. 
With cloud computing,
 all of these self-provisioned services need to be available over a network. In the case of public clouds,
 that network is the Internet. But
 something to watch out for is vendor lock-in. When we start looking at cloud
 computing providers, we want to make sure that we've got a provider that won't
 lock us into a proprietary file format for instance. If we're creating
 documents using some kind of cloud-based software, we want to make sure that
 data is portable and that we can move it back on-premises or even to another
 provider should that need arise. Then there is responsibility. 
This really gets
 broken between the cloud provider and the cloud consumer or subscriber,
 otherwise called a tenant. So the degree
 of responsibility really depends on the specific cloud service that we're
 talking about. But bear in mind that there is more responsibility with cloud
 computing services when we have more control. So if we need to be able to
 control underlying virtual machines, that's fine, but then it's up to us to
 manage those virtual machines and to make sure that they're updated. The hardware is the provider's responsibility. 
Things like power,
 physical data center facilities in which equipment is housed, servers, all
 that stuff. The software, depending on what we're talking about, could be
 split between the provider's responsibility and the subscriber's
 responsibility. For example, the provider might make a cloud-based email app
 available, but the subscriber configures it and adds user accounts, and
 determines things like how data is stored related to that mail service. Users
 and groups would be the subscriber's responsibility when it comes to identity
 and access management. 
Working with data
 and, for example, determining if that data is encrypted when stored in the
 cloud, that would be the subscriber's responsibility. Things like data center
 security would be the provider's responsibility. Whereas, as we've mentioned,
 data security would be the subscriber's responsibility when it comes to things
 like data encryption. The network connection however is the subscriber's
 responsibility, and it's always a good idea with cloud computing, at least
 with public cloud computing, to make sure you've got not one, but at least two
 network paths to that cloud provider.
A cloud is defined by resource pooling. So, we've got all this IT
 infrastructure pooled together that can be allocated as needed. Rapid elasticity means that we can quickly
 provision or de-provision resources as we need. And that's done through an
 on-demand self-provisioned portal, usually web-based. Broad network access means that we've got connectivity available
 to our cloud services. It's always available. And measured service means that it's metered, much like a utility, in
 that we only pay for those resources that we've actually used. So, now we've
 talked about some of the basic characteristics of the cloud and defined what
 cloud computing is.
For non-techies out
 there, the cloud might be an intimidating and nebulous concept. We hear about
 cloud computing all the time, but what exactly does it mean?
The National
 Institute of Standards and Technology (NIST) describes the basics of cloud
 computing this way:
Cloud computing is a model for enabling ubiquitous,
 convenient, on-demand network access to a shared pool of configurable
 computing resources (e.g., networks, servers, storage, applications, and
 services) that can be rapidly provisioned and released with minimal management
 effort or service provider interaction.
Still confused?
In short, the cloud
 is the Internet, and cloud computing is techspeak that describes software and
 services that run through the Internet (or an intranet) rather than on private
 servers and hard drives.  
Cloud computing is
 taking the world by storm. In fact, 94% of workloads and compute instances
 will be processed through cloud data centers by 2021, compared to only 6% by
 traditional data centers, according to research by Cisco.
So why companies are moving from traditional severs
 and datacentres to cloud ?
With
 cloud computing, it allows companies to have more time to focus on their
 business, instead of on the IT infrastructure. One of the reasons for this is
 because most of the IT infrastructure is the responsibility of the cloud
 provider.
With the
 cloud we have metered usage, whereby all of the usage of cloud resources is
 tracked and that's how we get billed. So, what that ends up meaning at the
 accounting level is that we're dealing with a monthly recurrent operating
 expense versus a capital expenditure. Which might be less frequent, but
 nonetheless requires capital for things like the acquisition of hardware to
 run on-premises networks. So, it's a monthly ongoing expense which often might
 include a subscription plus a usage fee. But also the nice thing about it is
 it can facilitate budgeting over time as we set a baseline for our usage of
 cloud resources in our environment. 
So, you
 pay for what you use similar to a utility like electricity or water.
We also
 have to bear in mind that the IT needs of an organization to support its
 business processes will change over time. Things like the amount of disk space
 that's needed, or the underlying server horsepower, maybe to perform Big Data
 analytics. We have to think about lost productivity and downtime from failed,
 or misconfigured, or even hacked IT systems. Then we have to recognize, in the
 cloud we've got the ability to rapidly provision and also deprovision
 resources. That can even be automated in some cases. Bear in mind that
 deprovisioning, for example scaling in, that would be removing virtual machine
 instances to support an app, saves money. Because we have less virtual
 machines running in the cloud at the same time.
In the
 cloud it's also very easy to enable high availability across different
 geographical regions. For example, to make sure our data or database replicas
 are highly available. The cloud also has a global reach with points of
 presence around the world with Google Cloud Platform. So, if we want to enable
 some content to be made available to users in Europe. Even though the web site
 that really hosts the content is in North America, we can do that using things
 like a cloud content delivery network,
 or CDN.
We should
 also plan to monitor the network link between our on-premises network and the
 cloud. Assuming that we have connectivity from on-premises to the cloud,
 whether it's for data center purposes or that's where end users are. We need
 to make sure that's done properly because we want to make sure that we have
 redundant links to the cloud. That's essentially the single point of failure
 between a company that has an on-premises environment as well as a cloud
 environment. The Internet links us between them and so, we need to make sure
 that it's trustworthy.
Then
 there's cloud economics. Consider this
 example, where we might have a return on investment, or ROI, of 5 years. Now
 that could mean that we have a payback period of 5.5 months. So that our total
 cost of ownership, or TCO reduction could potentially be upwards of 64%. Now
 these numbers will certainly vary depending on your usage of the cloud. Like
 the use of any type of commodity so to speak, it has to be used efficiently.
 That doesn't take care of itself in the cloud. We still have to manage it
 properly. It still requires proper IT workload and IT system governance.
So, what
 are some factors, then, that could feed into some of these potential cost
 savings? Well, one is less time spent updating and managing IT resources,
 because the bulk of that is the responsibility of the public cloud provider.
 Also high availability. We're more likely to have systems left up and running
 over the long term if they're hosted in different data centers owned by a
 cloud provider than we are on-premises. Then there's the rapid provisioning
 and deprovisioning or the scalability of resources. So, if we offer some kind
 of retail services online for shopping, maybe during holiday seasons. We have
 it configured to auto-scale to add other virtual machine instances to support
 the peak demand. But then when that disappears, so do the extra virtual
 machine instances. So, we're only paying for the peak demand usage that's
 required. And the lessened risk of downtime, besides high availability, is
 also something we consider in the SLA, the service level agreement. The
 service level agreement is a contractual document between the cloud provider
 and the cloud consumer. And one of the many things it will cover is things
 like expected uptime, and the consequences of that not being met.
Public Clouds
There are
 varying cloud models, one of which is the public cloud. The public cloud is
 accessible to all users over the Internet, potentially. Now, of course,
 they're going to have to sign up, either initially for a trial account, or
 initially or after the trial is expired for a paid account. But nonetheless,
 the public cloud is accessible to individuals. So, individual consumers as
 well as organizations, government agencies, academic institutions, and so on.
 So, this means then that with a public cloud environment, the public cloud
 provider has data centers around different geographical locations in the
 world. And as a result, they also have multiple cloud tenants or customers. Of
 course, each cloud tenant or customer, their configurations, and their data
 are kept completely separate from other cloud tenants. Otherwise, nobody would
 use the service, whether it be individuals or organizations.
Cloud
 provider hardware is owned by the cloud provider and exists in data centers in
 different regions around the world physically. So, what we end up having then
 is a large scale of pooled resources. Things like servers with a lot of
 horsepower that can act as hypervisors and run virtual machine guests and
 applications. Things like Docker containers. Also, we have things like pooled
 resources in the form of network equipment. That can be configured at a higher
 level by cloud tenants. Things like routing paths and firewall rules. Another
 example of a pooled resource, of course, would be storage that customers or
 tenants can provision at a moment's notice, or deprovision at a moment's
 notice, as well. So, the cloud provider, then, benefits from economies of
 scale. Due to the large number of cloud tenants or customers, it allows them
 to be able to acquire all of these facilities containing all of this physical
 computing equipment. And to assure that they meet specific security standards,
 so that they are trustworthy, and customers will actually use their service
 and pay for it. And so as a result, the economies of scale mean that users can
 end up perhaps with a small subscription fee but really, they only pay for
 what they are using. And that is in quite a stark contrast to the purchase of
 equipment on premises, and licensing in software, where once you've purchased
 it it's yours.
Then we
 have to consider network connectivity to and from the public cloud. Now,
 normally this is done over the Internet. Certainly, for individuals this is
 the case and even for most organizations. So, we have access to the public
 cloud provider services through the Internet. In the corporate environment,
 user devices like mobile smartphones, laptops, desktops will maybe reside on a
 corporate on-premises network that connects over the Internet to the cloud.
 Now, that can also happen even through a VPN if required, if we need that
 encrypted tunnel or if we want to link an on-premises network directly with a
 cloud-based network. Now, also, there's the option of a private dedicated
 connection.
With
 Google Cloud Platform, that's called Google
 Dedicated Interconnect. We'll get into the details later. But for now,
 essentially, it's a dedicated network link from your on-premises network or
 data center to the Google Cloud without going through the Internet. Now, if we
 are going to use network connectivity such as the Internet, we should consider
 redundant network paths. And ideally, that would be network connections from
 different Internet service providers. We don't want a single point of failure.
 So that if there's a problem with one Internet service provider, we can fall
 back on our Internet link to the Google public cloud to our secondary Internet
 service provider network link.
Private Clouds
Besides
 the public cloud type, we also have private clouds. Private clouds are
 different in that they're accessible only to a single organization. Whereas
 public clouds are accessible to anyone that wants to sign up over the
 Internet. So, it's organization-owned hardware infrastructure that the
 organization is responsible for configuring and maintaining over time.
 However, a private cloud still adheres to the exact same cloud characteristics
 that a public cloud does such as self-provisioning. Whether it's through some
 kind of a web user interface and the rapid elasticity of pooled IT resources,
 such as the ability to use a web interface to quickly deploy virtual machines
 or additional storage, maybe for use by a particular department within the
 organization.
So,
 you'll see private clouds in larger enterprises are often used for
 departmental chargeback. So, another common characteristic of a cloud is, metered usage. So, all the usage of resources
 is tracked and then, in this case, it's charged back to departments that use
 those IT resources.
A private
 cloud can also be extended into the public cloud. Now, that's where we get
 into what's called a hybrid cloud, and
 we might use that for something called cloud
 bursting. Cloud bursting essentially means that, once we've depleted
 our on-premises resources, whether that be the number of virtual machines we
 can run, or we've consumed all of our storage capacity on-premises. We've got
 a link to the cloud as a secondary plan B that can be used to provision, in
 our case, maybe additional virtual machines or additional storage. And in some
 cases, it won't even be known to the end user, this is actually happening into
 a different environment, into the public cloud.
The
 private cloud is sometimes the only real choice we have, because regulations
 might prohibit or limit the use of public cloud providers. So, if we're
 dealing with some kind of government sensitive data, we might be prohibited
 from that leaving a specific network under military control if it's that type
 of information.
In a
 private cloud, the organization has way more IT responsibility. Now, that
 comes in the form of the cost of acquiring all the equipment and paying
 personnel to configure it and maintain it over time. But also, fault tolerance
 is also the responsibility of the organization.  So, the organization is responsible for the installation,
 configuration, and maintenance of IT equipment for the private cloud. 
Now,
 organizations can have internal SLAs or service level agreements that
 guarantee uptime, for example, to departments that pay for their usage of
 those private cloud resources. And fault tolerance might be achieved by using clustering on-premises. Multiple servers that
 offer an app, if a server node goes down, then another one can pick up the
 slack and continue running the app.
The
 organization, in a private cloud, also has full
 control of that environment in how it's configured, how it's maintained
 and updated.
And, of
 course, there's definitely a further degree of
 privacy depending on the configuration. But generally, this is true
 because we don't have any data that is leaving the on-premises network. That's not to say that a private cloud is
 always more secure than the public cloud. Not necessarily true at all. But
 there is more privacy.
Community Clouds
We've
 already discussed public and private clouds. Another cloud type is a community
 cloud. A community cloud uses cloud provider IT infrastructure and pooled
 resources. So, really that's just cloud computing unto itself. However, what
 makes them a little bit different than a public or a private cloud is that
 there are same needs, or the same requirements exist across multiple tenants.
 Now, of course, that means that if the public cloud provider also offers
 public cloud computing to anyone over the Internet, that there is isolation
 from those public tenants.
In some
 cases, a community cloud would be the perfect solution to remain compliant
 with certain industry regulations.  So, a
 community cloud must ensure regulatory compliance. 
So, for
 example, for regulatory compliance, in terms of security, we might use G Suite
 for Government. Now, there also is FedRAMP compliant, where FedRAMP stands for
 the Federal Risk and Authorization Management Program. Where US government
 departments have to have certain security controls in place. Then on the
 medical side there's HIPAA compliance. HIPAA stands for the Health Insurance
 Portability and Accountability Act, and again, as usual, it's really about
 data governance on the security side. Making sure that data is protected with
 reasonable encryption. Whether it be data at rest, that would be stored data,
 or data being transmitted by configuring things appropriately like firewalls
 and intrusion detection systems. Other possible regulatory compliance items
 would deal with things like long term data retention policies and archiving
 and making sure that it's immutable. In other words, that something that's
 archived cannot then be modified.
Hybrid Clouds
You can
 think of a hybrid cloud as really being the best of both worlds. When we talk
 about both worlds we're talking about on-premises
 computing environments as well as cloud
 computing environments working together at the same time. Now this
 would be something that's common with public cloud adoption for an
 organization. Where we might run a private and public set of IT workloads in
 parallel or together as we migrate over time. Now that would mean taking data
 or systems or virtual machines. Even converting on-premises
 physical servers to virtual machines in the cloud. That physical to
 virtual conversion is called P2V. We can
 also use a hybrid cloud as a way to extend our private network into the cloud.
 And often that would be done for things like cloud bursting to meet peak
 demands. So that when we've depleted the IT resources available on-premises,
 we simply seamlessly extend into the public cloud to use additional resources
 there.
The
 migration of our on-premises systems and data can take a long time. So for
 example, we might have data that's stored on-premises and in the cloud. And
 maybe that is our backup solution, it's an off-site backup. So we might have
 an appliance on-premises that allows users to access data. But at the same
 time maybe it synchronizes or replicates data to the cloud for backup
 purposes. Could also be the other way around. We might also have cloud data
 presented to an on-premises appliance, which then presents itself to backup
 software on-premises as something like a virtual tape library. So our
 on-premises backup software just thinks, oh yeah, it's another regular backup
 source.
Now, in
 the case of the migration of very large amounts of data into Google Cloud. It
 might be unfeasible to think of doing that over and even the highest speed
 Internet connections. So instead, we might look at something like the Google Transfer Appliance. And what this
 really means is that we've got an on-premises storage appliance that we
 essentially copy data to. And that appliance is then physically shipped to a Google Cloud Platform data center where
 the data is then copied onto their infrastructure.
Another
 possible option to consider when we talk about hybrid clouds is the Google Dedicated Interconnect feature. We'll
 focus on its details later. But what it really lets us do is bypass the
 Internet by having a private dedicated network
 link from our on-premises network directly into the Google Cloud. Now, that
 normally means that we have more predictable
 throughput than we would by using a shared connection over the Internet. And
 one might argue it might offer more security since it's private. Now of
 course, over the Internet we could also achieve security by using a VPN tunnel. But Google Dedicated Interconnect
 is yet another consideration when we think about hybrid cloud computing.
Service Models in Cloud Computing
One type
 of cloud computing service model is software as a service, which is otherwise
 simply called SaaS. Now, really what this is, is application or office
 productivity software that's hosted on provider equipment. And it's accessible
 over a network such as the Internet. So normally, it requires only a web
 browser. It might require some plugins. But usually, the web browser and a
 plugin would be the extent to what's required to access SaaS services. And
 often they'll offer some degree of customization. Where you can configure
 maybe the visual appearance or skins or certain security settings related to
 the specific SaaS tool you're using.
For
 example, if we're using office productivity tools like word processors through
 a cloud provider. So with software as a service because it is cloud computing,
 we pay for the usage of a service. For example, we have Gmail and G Suite,
 which are considered software as a service offerings through Google. And in
 the case of Gmail, depending on whether it's being used by an individual or a
 large enterprise determines on the cost of it, in terms of the storage space
 for archived messages. Or the number of messages in and out.
Software
 as a service relies on virtualization. And this also means that we've got
 tenant isolation. Now the virtualization doesn't necessarily mean virtual
 machine operating system virtualization. It could also be application
 virtualization using what are called application containers. In other words, no control of underlying virtual
 machines, also known as VMs.  In the end, as a cloud consumer, we
 don't really care as long as the isolation is in place. So for example, if I'm
 using a cloud Gmail solution, I want to make sure that my organization's Gmail
 accounts are not in any way accessible to other Google cloud tenants. So when
 we talk about software as a service, yes, it does rely on virtualization of
 some kind at some level. However, that's not visible and certainly its
 configuration is not available to us as cloud consumers. That configuration,
 including things like making changes or applying patches is the responsibility
 of the cloud provider. Software as a service also removes the need for things
 like installing software and licensing it. So really, it transfers the IT
 management responsibility from our organization to the cloud provider instead.
With
 software as a service, one business consideration is vendor lock-in. So we
 might take a look at the service level agreements for the various cloud
 services we use from a specific cloud provider. Service level agreements are also known as SLAs. Because we
 want to make sure that if we decide that we want to stop cloud computing, we
 want to go back on-premises or switch to a different public cloud provider,
 that we can. And that might mean that we have to ensure that data can be
 exported in a standard format from one provider and then imported to another.
 Or even live migrated over the Internet.
 For example, with Google, we have the option
 of actually migrating Amazon Web Services storage data from Amazon Web
 Services directly into Google Cloud Storage. We then have to think about our
 network connection. Because when we depend on software as a service, that
 network connection to the cloud is our single point of failure if we've only
 got one network connection. So, there is a
 dependency on connecting to the cloud provider. We should also make
 sure that we acquire sufficient bandwidth in that connection. And that would
 depend upon, for instance, the number of users that would concurrently be
 using software as a service through that network link. And again, due to
 having a single point of failure, we should really consider having redundant
 network paths. In the case of Internet connections, that would be multiple
 Internet connections ideally in a perfect world through different Internet
 service providers.
Now we
 will look into  infrastructure as a
 service. Just like software as a service is a different type of cloud service
 model, well, so is infrastructure as a service and it's normally just called IaaS. It relies on virtualization. For
 example, working with virtual machines.  Virtual
 machines are also known as VMs.When we deploy our virtual machine
 instance, that's infrastructure as a service. When we provision new storage in
 the cloud, that is infrastructure as a service. So is things like network
 configurations, like firewall rule sets. It's all part of our network
 infrastructure. Physical equipment that makes all of this possible is actually
 housed in Google Cloud data centers around the globe. Now because that
 acquisition of hardware, that expense in powering it and cooling it and so on
 is done by Google, it’s their responsibility. So for us, the cloud customer,
 it reduces capital expenditures on our end. All we do is pay for what we use,
 which is really just an operational expense.
Infrastructure
 as a service can be provisioned using the Google Cloud console, so using the
 web GUI. Or of course it can be provisioned and managed programmatically
 through various APIs. Or even using the GCloud command line tool. We provision
 and manage infrastructure as a service over the network. And it also supports
 scalability, on-demand where we pay for the usage. So if we decide, for
 example, we want to provision four new virtual machines, we can do that in a
 matter of minutes with a few clicks. That same thing is true if we want to
 provision additional storage. And also deprovisioning
 resources that we no longer need to save on costs. This might even be
 automated. So we might even configure something like a VM instance group in
 Google Cloud Platform and configure it with a specific number of instances to
 support things like autoscaling. So that
 when we have a peak demand in an app, we scale out horizontally. We add more
 virtual machines to support the app and when that demand declines, so does the
 number of virtual machines we scale back in.
Google Cloud Storage is definitely considered
 infrastructure as a service. All of the network configurations are also part
 of infrastructure, and this uses something called software defined networking. Now, that's not specific to Google
 Cloud computing. It's a standard cloud computing term that's often referred to
 as SDN. And what it really means is that
 we, the cloud customers, have an easy way of configuring network resources.
Deploying
 cloud virtual networks and IP ranges and firewall rules without actually
 communicating directly with the underlying physical network hardware that
 makes all of that possible. Of course, we would then deploy virtual private clouds or VPCs. In
 other words, a VPC is a virtual network in the cloud. These are
 simply virtual network configurations that we define in the cloud. And then we
 deploy our resources like virtual machine instances into the VPCs. We
 mentioned that we have firewall rule sets that can be configured for a VPC or
 even specific VM instances that control inbound or outbound network traffic.
So what
 is infrastructure as a service normally used for? 
So, infrastructure as a service would commonly be
 used as follows.  Well, often it will be used for testing purposes, because it's so quick and
 easy to provision, for instance, virtual machines that are isolated from
 others in a VPC. So it's sandboxed, maybe to test an application quickly. Or
 to host a web site, whether it's for
 private organizational use, or it's a public-facing
 web site. We might use infrastructure as a service for cloud storage and/or backup. Even for high
 performance computing or HPC, where we can configure clusters for the purpose
 of parallel computing, which you might use for things like Big Data analytics.
Platform
 as a service is yet another type of cloud computing service model, and it's
 often simply called PaaS. Now it's related more to applications, the
 development of applications, and then the deployment of them. Whether that's
 in a staging or test environment or deploying it into production. So the focus
 then is on the application rather than the underlying supporting resources
 like network configurations, virtual machines, and storage. Or virtual servers. 
Platform
 as a service-specific resources would include things like development tools.
 Now that would include also APIs that expose cloud functionality to developers
 in a variety of different languages. And that's definitely the case with
 Google Cloud Platform. Many of the cloud services are available to developers
 in languages like C#, Python, Java and so on. Also platform as a service deals
 with databases. So if we want to deploy a MySQL database, for example, in the
 cloud the underlying complexities like virtual machines, installing the
 software and so on, that's already taken care of in most cases. We simply tell
 our environment, our GUI environment, or whether we're doing it through the
 command line, that we want to deploy some kind of a database in the cloud. A
 couple of parameters, such as, like the number of replicas, whether we want to
 use our own license, that type of thing. And it just happens very quickly.
Other
 types of PaaS resources would include things like business intelligence tools
 or Big Data analytical tools. These are essentially like extensions that can
 take data that's been massaged through our platform as a service use. And then
 we can gain insights from them that otherwise wouldn't readily be apparent.
 Some examples of Google Cloud platform as a service offerings would include
 MySQL or even using the Docker Container
 Registry. Where Docker containers are essentially a way to isolate
 applications from one another, like virtual machines can isolate operating
 systems from one another.
Disaster Recovery as a Service (DRaaS)
Even
 though it doesn't sound like a good idea, planning for failure is a good idea.
 It's really related to disaster recovery. In the cloud, we're really talking
 about Disaster Recovery as a Service, otherwise called DRaaS. Now with traditional on-premises disaster recovery,
 otherwise simply called DR, we have things like off-site backups to protect
 data. Failover clustering, so that if we've got a critical app running on a
 host that fails, that app can then run on another host within the cluster, and
 in some cases, with zero downtime. We then have machine imaging that we can
 then use to quickly get a system back up and running in the event of a
 disaster. And then on the facility side, we've got power generators in case the
 power grid goes down. There are battery-powered lights and so on. Now that's
 with a traditional on-premises disaster recovery mechanism.
Now in
 the cloud, with Disaster Recovery as a Service or DRaaS, we have a much smaller capital expenditure than traditional
 disaster recovery. Actually there's no capital expenditure really because in
 the cloud, we have an ongoing operational expense instead. So that means
 dealing with things like data backups, maybe from on-premises, to the cloud,
 and also long-term data archiving to the cloud. We might even have a hybrid
 cloud solution where we extend our on-premises workloads into the Google
 Cloud. So often that might be done in the case of disaster recovery so that if
 we have a problem with an on-premises IT workload, it can failover into the
 cloud as required.
So
 Disaster Recovery as a Service then will vary from one public cloud provider
 to the next. But generally speaking, it allows us to utilize cloud provider
 infrastructure in case we have a failure of some kind with our on-premises
 environment.
Summary 
The public cloud is available to all over the
 Internet. It might require signing up for an account, but potentially anyone
 over the Internet, individual or organization, can sign up for public cloud
 computing services.
A private cloud is different because it has all
 of the cloud characteristics that a public cloud would have. Things like rapid
 elasticity, self-provisioning, metered usage and so on. However, it's all
 under the control of a single organization. So it's an organization's
 infrastructure on-premises. They've paid for it, they're responsible for it,
 and they manage it. Hence, it's a private cloud. But take note that just
 because you're using virtualization on-premises does not mean you have a
 cloud. You have to meet the cloud characteristics of metered usage,
 self-provisioning, rapid elasticity, broad access, and so on.
A community cloud means that we've got the
 infrastructure available but really for special needs, so organizations that
 have similar computing requirements. Often it's usually in the case of
 isolation and security, and maybe even certain types of connections or certain
 app availability. Those similar computing requirements are best served through
 what's called a community cloud.
A hybrid cloud uses on-premises as well as cloud
 resources in the public cloud environment. So for example, we might have a VPN
 link between our on-premises network or data center and the Google Cloud VPC
 or a virtual network in the Google Cloud. We might have on-premises clients
 that access Google Cloud virtual machine instances, that might also happen
 through that VPN link. Virtual machines
 are also known as VMs. Now, in some cases a hybrid cloud could be a
 temporary solution during cloud adoption and the migration of data and IT
 workloads from on-premises to the cloud. But also a hybrid cloud could also be
 a more longer term solution for cloud bursting,
 which means that we have depleted our on-premises IT resources and now need to
 use public cloud resources. It might also be used for high availability where
 we use it as a disaster recovery solution
 if we have a failed workload on-premises we might have it configured to fail
 over to the cloud.
Software as a service or SaaS is often in the
 form of end-user productivity software where the cloud provider is responsible
 for the maintenance of this software. The installation, the general
 configuration, updating and so on. So in the Google Cloud we might use
 software as a service offerings such as G Suite, or even using Gmail.
Infrastructure as a service, or IaaS, is
 really based on IT infrastructure components. So that would be things like
 virtual machines, or cloud storage, or cloud network configurations such as
 VPCs, or IP address ranges we configure for certain VPC subnets, or firewall
 configurations, or VPN connections, and so on. So in the case of Google Cloud,
 infrastructure as a service would include virtual machine instances, VPCs,
 which are virtual networks in the cloud and Google Cloud Storage offering.
Characteristics of cloud computing.
What makes a cloud a cloud? 5 defining
 characteristics are,
This excerpt is from
 'The Economics of Cloud Computing:
 An Overview For Decision Makers,' by Bill Williams. Coming in July from Cisco
 Press (ISBN: 1587143062).
With
 traditional IT computing, we have an on-premises computing environment, which
 requires a capital investment in hardware. We then have to power the
 equipment. We have to assure that we have proper HVAC, that's Heating,
 Ventilation, and Air Conditioning to make sure that equipment runs smoothly.
 Then we have to license software. After we acquire the software, it needs to
 be installed, configured, and maintained, including upgrades and even updates.
Now in
 the cloud, we're talking about hosted IT services on the Google Cloud
 Platform, that's on Google's equipment in their data centers around the world.
 That includes servers, storage, databases, web apps, and so on. And just like
 a utility, such as electricity, with cloud computing we pay for the services
 that we use. There's also self-provisioning on demand, where we can either
 programmatically or from a command line or using a GUI, we can provision cloud
 resources or deprovision them if we need less. Also, the services are all
 accessible over a network such as the Internet. But we should always be
 careful with cloud computing to avoid vendor lock-in. And we want to make sure
 that means that we have the ability to export data to standard formats or to
 migrate data to other providers should we have a need in the future.
In the
 cloud, there is often shared responsibility of taking care of the IT workload
 running in the cloud. But the degree of that responsibility depends on the
 specific cloud service that we're talking about. For example, if we're talking
 about a hosted database in the cloud, maybe the underlying virtual machine
 operating system and updates are taken care of by the cloud provider. So more
 responsibility does, however, mean more control. Hardware is the provider's responsibility, whether we're
 talking about network routers and switches, storage arrays, physical
 hypervisor servers, and so on. The software, in some cases, will be the
 provider's responsibility, such as in the case of something like Gmail.
 However, the subscriber has some responsibility in terms of using it and
 configuring it to serve their business needs. So it's a little bit of both, in
 that case, with software.
When it
 comes to the creation of users and groups, and in the Google Cloud Platform
 that's called IAM, identity access and management, that's the subscriber's
 responsibility. It's not Google's responsibility. Just like the creation and
 management of data is the subscriber's responsibility. Security, in some
 cases, can be the subscriber's responsibility. But the provider also has a
 role in that, in making sure that their data centers, the equipment, and the
 staff are all falling under the appropriate security recommendations to run a
 proper IT cloud environment. The network connection, of course, is the
 subscriber's responsibility. And that's why often it pays to have redundant
 links, ideally through different Internet service providers, to assure that we
 can get to the Google Cloud.
Google
 manages the physical data center facilities that house all of the racks of
 equipment. So they deal with things like hardware physical security, such as
 locking up racks of equipment. They deal with the physical network
 infrastructure links and the virtualization infrastructure, which really means
 having the hypervisors that can run the virtual machines on them.
The
 subscriber has a responsibility with the virtual machine instances that they
 might deploy. [Video description begins] Virtual
 machine is also referred to as VM. [Video description ends] How
 they configure and create policies, such as how to control firewall rules and
 also how to control data retention. That is under the subscriber's
 responsibility, in this case. Dealing with user credentials, whether for example,
 multi-factor authentication is configured, is the subscriber's responsibility.
 Such as whether data at rest or data in transit is encrypted. And also what
 type of data stores are being used to hold cloud-based storage information.
The cloud
 really has a number of characteristics, such as resource pooling, having all
 of these resources available for cloud consumers. Broad network access allows
 access over the network using any type of device. The network in this case
 being the Internet. Cloud computing also has a characteristic of having
 on-demand self-provisioning. Usually, that's done through a web interface. So,
 for example, if a client requires more storage, they can simply click a few
 buttons and it's done very quickly. It's a measured or metered service, and
 that's how we pay for our usage of cloud computing. The rapid elasticity is a
 result of both resource pooling and self-provisioning, where we can rapidly,
 in our example, deploy more storage or even more virtual machines as required.




























 
No comments:
Post a Comment