Home > Articles

This chapter is from the book

Common Cloud Models

220-1101: Objective 4.1: Summarize cloud-computing concepts.

exam1.jpg

The cloud refers to any type of computing—including program execution, storage, or services—that takes place remotely. Understanding basic cloud concepts is important for technicians, who will increasingly be asked to manage software or data in the cloud. Some of those functions are described in the following sections.

IaaS

Infrastructure as a Service (IaaS) enables customers to purchase access to data center infrastructure such as storage, network, and networking services. In this model, the cloud provider covers the costs and work involved in equipment, firewall configurations, and other maintenance. Thousands of companies are realizing that they can reduce the costs of their network infrastructure by outsourcing storage and computing services to a cloud provider. These include new startup companies that lack the capital resources to buy and manage equipment as they grow and established companies that want to reduce the costs related to backup and storage of their networks.

One key feature of IaaS is the flexibility it offers to customers, who can now just use the virtual resources they need when they need them instead of having to pay for them when they don’t need them.

IaaS puts users in charge of all the software used in a project, from applications and data to the operating system. IaaS vendors supply the hardware and network support tools.

Amazon first introduced cloud services in 2006, and the field of cloud providers continues to grow. At press time, the three largest cloud providers are as follows:

  • Amazon Web Services (AWS)

  • Microsoft Azure

  • Google Cloud

SaaS

Software as a Service (SaaS) refers to software that is hosted on servers and accessed through a web browser. Because SaaS processing is performed at the server, a thin client, smartphone, or tablet is sufficient to run the software. A browser-based service that does not require a user to download an application code to use the service is an example of SaaS.

Perhaps the best-known SaaS is Google Mail (Gmail). Gmail servers provide the Gmail service to anyone who has a web browser. Other examples of SaaS include the following:

SaaS is a cloud-based software licensing and delivery model that grants customers access to software on a subscription basis using the SaaS vendor’s servers. SaaS is designed for organizations that need to use a service rather than develop or deploy one. Figure 4-2 illustrates the word processor in Google Docs.

Figure 4.2

Figure 4.2 Using the Google Docs Word Processor to Create a Report from a Template, with Random Text as Placeholders

PaaS

Platform as a Service (PaaS) enables vendors to develop and deploy application software in a cloud environment. A developer using PaaS can concentrate on software features instead of possible issues with server hardware and operating systems.

Some of the major PaaS vendors include the following:

Many vendors provide many services across multiple platforms.

Keep in mind the following considerations in selecting a PaaS vendor:

  • Language and server-side support: Make sure the vendor selected supports the languages used for development and the server-side technologies the apps depend on. Most major PaaS vendors support languages such as Java, Ruby, PHP, and Python, but server-side technology support varies a great deal.

  • Integration with existing investments: Some PaaS vendor products can integrate with existing apps and data, meaning that cloud platforms can work with existing resources instead of requiring users to replace them entirely.

  • Costs: Most PaaS vendors use pricing by the hour, but some price by the month. Be sure your precommitment cost estimations take into account the software tools and services you need; pricing can vary according to the tools or services bundled.

Public vs. Private vs. Hybrid vs. Community

Four general types of cloud computing are used. Each type can have variables in its implementation, depending on customer needs.

key_topic_icon2.jpg
  • Public cloud computing is available to any organization that signs up or pays for it. The connection between services and organizations is the public Internet. Public cloud computing typically includes built-in features and tools that would be too expensive to implement on their own. This allows organizations to pay for the features and options needed without buying, setting up, and maintaining the hardware themselves.

  • Private cloud computing is available only to authorized users in divisions or departments of a single company. The company owns and manages the cloud behind its corporate firewall, and its employees maintain the equipment. Private cloud computing is considered to be more secure than public cloud computing. Private cloud computing is great for organizations that are highly regulated or need strict control over business-critical data, such as financial or health care organizations.

  • Hybrid cloud computing combines features of public and private cloud computing. A typical hybrid installation includes dedicated and cloud-based servers and high-speed interconnections with load balancing to move workloads between the environments as needed. Hybrid cloud computing is best for organizations that need to utilize both private and public clouds. For example, a financial institution might want to store critical and sensitive data on a private cloud while using a public cloud to store lower-risk data.

  • Community cloud computing is a type of hybrid cloud computing used by different organizations that are working together. The organizations work as partners to build the community cloud and share its costs. This model works well for organizations that are working together temporarily on a single goal or project. When the project is finished, they can dissolve the cloud.

Cloud Characteristics

Cloud computing is a generic term that can encompass several different computer network models and features that serve a customer’s unique requirements. This section describes different ways a computer cloud can be designed and implemented to meet the computing and network needs of a company or institution.

Shared Resources

key_topic_icon2.jpg

Shared resources refers to the practice of sharing equipment or data on a network to save costs. This is the most common reason for implementing cloud computing. The way clouds are designed and implemented can vary according to the customer’s needs. Devices and data can be shared over the Internet in two main ways: using an internal cloud or using an external cloud.

Internal Cloud

Internal and external clouds are defined by the ownership of the cloud’s resources. With an internal cloud, a company might need the flexibility of cloud services but also have security and guaranteed availability requirements that prevent the company from accessing cloud services outside its own network. An internal cloud is similar to a private cloud, but it is built and owned inside the organization. With an internal cloud, the company gets the virtualization services and flexibility of a commercial cloud, but with the security and reliability that comes from existing within the company’s network infrastructure. The cost of an internal cloud might be higher than the cost of outsourcing to commercial services, but sharing resources internally still reduces the cost.

External Cloud

An external cloud is a cloud solution that exists outside an organization’s physical boundaries. It can be private, public, or community based, as long as it is not located on an organization’s property.

Rapid Elasticity

Rapid elasticity refers to the capability to rapidly scale up and scale back cloud computing resources as needed. For example, selling high-demand concert tickets in the days before cloud computing often resulted in crashing servers and disappointed customers. Thanks to the rapid elasticity of the cloud, high-demand events can quickly expand capacity for online sales without leaving customers unserved when they try to buy.

High Availability

The cloud is always up and open for work. Providers maintain reliable service by replicating cloud servers in clusters within their data centers. This way, if one server crashes, other servers can pick up the work.

Another way providers ensure reliable high availability is to replicate entire data centers in different parts of a geographical region, or even across the globe. This model ensures that a customer’s computing services will not be disrupted by natural disasters such as earthquakes, fires, and storms. With global availability, customers can place their services closest to their customers around the world, to reduce access time to web servers and data.

File Synchronization

Storing, moving, backing up, and updating data can be a huge task for a company’s IT department. Cloud providers have designed file synchronization services to make replicating on-premises data synching to multiple sites both automated and reliable. AWS DataSync and Microsoft’s SQL Data Sync are two examples of this specialized service. These automated services allow companies’ IT departments to focus on other tasks.

On-Demand

On-demand is a shortened term for on-demand self-services. On-demand self-services from SaaS providers such as Salesforce.com, Gmail, and others are available to customers when they need them but do not need to be maintained by the customer when they are not needed.

Metered Utilization

Organizations purchase cloud computing services in much the same way as utilities such as gas, water, and electricity. With metered utilization, these services are measured in some way, and the price is based on the amount used. Cloud providers can base prices in different ways for different services. For example, cloud computing services are metered by the minute: The user pays only for the minutes used. Storage services are usually charged by the gigabyte. More complex cloud services, such as replication of servers to be used in different areas, charge by the instance of snapshots or other services.

Of course, cloud providers have many different pricing schedules. Three common ones follow:

  • Pay as you go: The customer pays only for services used and pays for computing time only when needed. This can be beneficial for new businesses that are unsure of their future computing needs.

  • Bulk purchasing: This arrangement is similar to pay-as-you-go pricing, but it involves a commitment to use a specific amount over a period of one to three years.

  • Tiered pricing: The more services are used, the less they cost per unit. For example, the more storage service a company purchases, the less it pays per gigabyte of storage.

Metered cloud services can mean immense savings for customers whose computing needs are periodic or uncertain, and their popularity accounts for much of the growth of cloud services. To save money, many companies are outsourcing their data center tasks to the cloud.

key_topic_icon2.jpg

Desktop Virtualization

Desktop virtualization refers to creating a user interface to a computer that is hosted on a central server on-premises or perhaps in the cloud. Either way, the user experience with the virtual desktop is the same. When a company uses a vendor’s virtual desktop infrastructure (VDI), users can use minimally powered devices with an Internet connection and work as if processing were happening locally. Basically, VDI allows organizations to offer users remote access to virtual desktop environments from almost any device, such as a smart phone, tablet, or laptop. They can access this through client software installed on their local device or on a web browser.

Desktop virtualization is also known as thin client networking because the processing is centralized. Only mouse and keyboard inputs are sent across the local network for on-premises VDI or across the Internet for VDI in the cloud.

When a VM has an operating system installed, it appears and can behave like any other computer on a network. To interact with other machines, it needs to have a virtual network interface card (NIC) installed so that it can have a physical MAC address and an IP address. The virtual NIC behaves almost exactly like a physical NIC, but the administrator can use the virtual machine manager (VMM) to assign a specific MAC address. This is different from physical NICs with MAC addresses that are burned into the hardware by the manufacturer.

If administrators want the VM to communicate with other machines, they can create a path, or bridge, between the virtual NIC and the physical NIC on the VMM hardware. This allows the VM to communicate like any other machine in the LAN. In Hyper-V, this can be done by creating a virtual switch under the Virtual Switch Manager (see Figure 4-3).

Figure 4.3

Figure 4.3 Creating a Virtual Switch in Hyper-V

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020