Hybrid Cloud Computing for FOSS4G Bastian Schäffer, Theodor Foerster & Bastian Baranski 52°North

FOSS4G 2010

www.52north.org/security

Google Trends

FOSS4G 2010

www.52north.org/security

Aspects Characteristi cs •Virtualization •Ubiquität •Elasticity •Scalability •Reliability •Diversity •Service Level Agreements •Pay-per-use •On-demand

FOSS4G 2010

Roles •User •Broker •Customer •Provider

Provider Types •Provider •Enabler

Activities •Research •Commercial Offering •Usage

Cloud Computing

Benefits •Flexibility •High performance •Risc minimization •Geopgraphic independence

Constraints •Data Privacy •Data Disjunction •Data Recovery

Composition •Hardware •Software •Devices •Support

Categories •SaaS •PaaS •IaaS

Models •Private Cloud •Public Cloud •Hybrid Cloud

Source: Fraunhofer IAO, IAT Universität Stuttgart

www.52north.org/security

Aspects Characteristi cs •Virtualization •Ubiquität •Elasticity •Scalability •Reliability •Diversity •Service Level Agreements •Pay-per-use •On-demand

FOSS4G 2010

Roles •User •Broker •Customer •Provider

Provider Types •Provider •Enabler

Activities •Research •Commercial Offering •Usage

Cloud Computing

Benefits •Flexibility •High performance •Risc minimization •Geopgraphic independence

Constraints •Data Privacy •Data Disjunction •Data Recovery

Composition •Hardware •Software •Devices •Support

Categories •SaaS •PaaS •IaaS

Models •Private Cloud •Public Cloud •Hybrid Cloud

Source: Fraunhofer IAO, IAT Universität Stuttgart

www.52north.org/security

Cloud Computing    

The cloud metaphor is used to represent efficient, elastic, scalable and reliable computational infrastructures Provisioning of resources (server, storage, applications … whole IT infrastructures) via services and web-applications over the network Outsourcing data and applications to external service providers Replacing classical desktop software with web-based applications

1999 Grid Computing

FOSS4G 2010

2009 Utility Computing

Software as a Service (Saas)

Cloud Computing

www.52north.org/security

Categories Software as a Service (SaaS)

- Dyncamic Software and data provisioning (outsourcing, on-demand) - Allows pay-per-use revenue models

Platform as a Service (PaaS)

- Software development and deployment platform - Quality of Service, QoS (scalability) managed by cloud provider

Infrastructure as a Service (IaaS)

- Virtualized and dynamically managed (elasticity) IT infrastructure - Dynamic resource (server, storage) provisioning (ondemand) - Delivers computational infrastructures as services over the network

Server FOSS4G 2010

Storage www.52north.org/security

IT investments & maintenance Taifun?

requests

80.000$ 40.000$ 20.000$

time FOSS4G 2010

www.52north.org/security

IT investments & maintenance 120.000$

requests

80.000$ 40.000$ 20.000$

time FOSS4G 2010

www.52north.org/security

IT investments & maintenance 120.000$

requests

80.000$ 40.000$ 20.000$

time FOSS4G 2010

www.52north.org/security

Hybrid Clouds

Hybrid Cloud

Private Cloud

FOSS4G 2010

Public Cloud

www.52north.org/security

Hybrid Clouds

Hybrid Cloud Load Balancer

Public Cloud

Private Cloud WMS

WMS

WMS

WMS

WMS

WMS FOSS4G 2010

www.52north.org/security

Static Model

FOSS4G 2010

www.52north.org/security

Architecture Intel Core 2 Duo CPU E6850 3.00GHz

Intel Pentium D CPU 2.80GHz

4GB RAM

2GB RAM

Intel Core 2 Duo CPU E8500 3.16GHz 4GB RAM

FOSS4G 2010

www.52north.org/security

Architecture

FOSS4G 2010

www.52north.org/security

Architecture

Head Node

Worker Node 1 FOSS4G 2010

Worker Node 2 www.52north.org/security

Architecture

Head Node

Worker Node 1 FOSS4G 2010

Worker Node 2 www.52north.org/security

Head Node

Cloud Controller Cluster Controller

FOSS4G 2010

www.52north.org/security

Architecture

Head Node

Worker Node 1 FOSS4G 2010

Worker Node 2 www.52north.org/security

Worker Node

VM VM VM VM

FOSS4G 2010

sysstat: CPUMon

www.52north.org/security

Big Picture

VM VM VM VM

FOSS4G 2010

VM VM VM VM

www.52north.org/security

Dynamic Model

FOSS4G 2010

www.52north.org/security

Big Picture 1

VM

FOSS4G 2010

1

1

www.52north.org/security

Big Picture 1

VM

FOSS4G 2010

1

1

www.52north.org/security

Big Picture 1

VM

FOSS4G 2010

1

1

www.52north.org/security

Big Picture 1

VM

FOSS4G 2010

1

1

www.52north.org/security

Big Picture 1

VM

FOSS4G 2010

1

1

www.52north.org/security

Big Picture 1

VM

FOSS4G 2010

1

1

www.52north.org/security

Big Picture 1

VM

FOSS4G 2010

1

1

www.52north.org/security

Big Picture 1,2

1

1

VM 2 VM

FOSS4G 2010

www.52north.org/security

Big Picture 1,2

1

1

VM 2 VM

FOSS4G 2010

www.52north.org/security

Big Picture 1,2

1,2

1

VM 2 VM

FOSS4G 2010

www.52north.org/security

Big Picture 1,2

1,2

1

VM 2 VM

FOSS4G 2010

www.52north.org/security

Big Picture 1,2

1,2

1

VM 2 VM

FOSS4G 2010

www.52north.org/security

Big Picture 1,2,3,4

1

VM 2 VM

FOSS4G 2010

1,2,3,4

3

VM 4 VM

5

VM 6 VM

www.52north.org/security

Big Picture 1,2,3,4

1

VM 2 VM

FOSS4G 2010

1,2,3,4

3

VM 4 VM

5

VM … VM n VM

www.52north.org/security

Dashboard

FOSS4G 2010

www.52north.org/security

Transparent

FOSS4G 2010

www.52north.org/security

Summary • • • • •

Hybrid Cloud Evolution Cost effective and elastic setup Scaleable Transparent Manageable

FOSS4G 2010

www.52north.org/security

Future Work • Performance Tests • ROI/Break Even

FOSS4G 2010

www.52north.org/security