1 / 17

Cloud computing and network security

Cloud computing and network security. By Naranchuluun Davaanyam. IT Perspective for Developer. Capital Expenditure ( CapEx ) for development environ. could be high Acquisition of hardware , software, necessary services, etc. HW, SW upgrades, back up/restore of development environ., etc.

tallys
Download Presentation

Cloud computing and network security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloud computing and network security By Naranchuluun Davaanyam

  2. IT Perspective for Developer • Capital Expenditure (CapEx) for development environ. could be high • Acquisition of hardware, software, necessary services, etc. • HW, SW upgrades, back up/restore of development environ., etc. • Operational Expenditure (OpEx) for support, etc. Development environ. utilization low

  3. IT Perspective for DC • CapEx for the data center (DC) is very high • Scalability, availability, and DR require redundant HW + SW • OpEx can also be high • App administrators, DBA, storage administrators are expensive • Data center power usage and cooling has also become a big issue • Data center resource utilization is typically low • Redundant HW + SW usually sit idle for a long time

  4. Enterprise Perspective

  5. ISP evolution

  6. What’s cloud computing?

  7. Definition of Cloud Computing Cloud(үүлэн) тооцоолол гэдэг нь сүлжээнд холбогдсон програм хангамж ба виртуал хэлбэрт шилжсэн техник тоног төхөөрөмж, тэдгээрийг уян хатан удирдан зохицуулах програм хангамж болон үйлчилгээний цогц байдлыг хэлнэ. 5 Essential Characteristics • On-demand self-service • Broad network access • Resource pooling • Rapid elasticity • Measured service • 3 Service Models • SaaS • PaaS • IaaS • 4 Deployment Models • Public Cloud • Private Cloud • Community Cloud • Hybrid Cloud

  8. Cloud Computing Characteristics:On-Demand Self-Service

  9. Cloud Computing Characteristics:Broad Network Access

  10. Cloud Computing Characteristics:Resource Pooling

  11. Cloud Computing Characteristics:Rapid Elasticity Cluster 1 Enterprise 1 Enterprise 2 Cluster 2

  12. Cloud Computing Characteristics:Measured Service

  13. Cloud Computing Service Models:Software-as-a-Service (SaaS) Consumer uses the provider’s applications runningon a cloud.

  14. Cloud Computing Service Models:Platform-as-a-Service (PaaS) • Consumer uses the programming languages and tools supported by the provider to create and deploy applications or deploy acquired applications Elastic Beanstalk (beta)

  15. Cloud Computing Service Models:Infrastructure-as-a-Service (IaaS) • Consumer uses provider’s processing, storage, networks, and other fundamental computing resources to deploy and run arbitrary software, which can include operating systems and applications. Elastic Compute Cloud (EC2)

  16. Cloud Computing Deployment Models • Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. • Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns. • Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. • Hybrid cloud. The cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

  17. Thank you for your attention

More Related