Hybrid Cloud Computing for FOSS4G Bastian Schäffer, Theodor Foerster & Bastian Baranski 52°North
FOSS4G 2010
www.52north.org/security
Google Trends
FOSS4G 2010
www.52north.org/security
Aspects Characteristi cs •Virtualization •Ubiquität •Elasticity •Scalability •Reliability •Diversity •Service Level Agreements •Pay-per-use •On-demand
FOSS4G 2010
Roles •User •Broker •Customer •Provider
Provider Types •Provider •Enabler
Activities •Research •Commercial Offering •Usage
Cloud Computing
Benefits •Flexibility •High performance •Risc minimization •Geopgraphic independence
Constraints •Data Privacy •Data Disjunction •Data Recovery
Composition •Hardware •Software •Devices •Support
Categories •SaaS •PaaS •IaaS
Models •Private Cloud •Public Cloud •Hybrid Cloud
Source: Fraunhofer IAO, IAT Universität Stuttgart
www.52north.org/security
Aspects Characteristi cs •Virtualization •Ubiquität •Elasticity •Scalability •Reliability •Diversity •Service Level Agreements •Pay-per-use •On-demand
FOSS4G 2010
Roles •User •Broker •Customer •Provider
Provider Types •Provider •Enabler
Activities •Research •Commercial Offering •Usage
Cloud Computing
Benefits •Flexibility •High performance •Risc minimization •Geopgraphic independence
Constraints •Data Privacy •Data Disjunction •Data Recovery
Composition •Hardware •Software •Devices •Support
Categories •SaaS •PaaS •IaaS
Models •Private Cloud •Public Cloud •Hybrid Cloud
Source: Fraunhofer IAO, IAT Universität Stuttgart
www.52north.org/security
Cloud Computing
The cloud metaphor is used to represent efficient, elastic, scalable and reliable computational infrastructures Provisioning of resources (server, storage, applications … whole IT infrastructures) via services and web-applications over the network Outsourcing data and applications to external service providers Replacing classical desktop software with web-based applications
1999 Grid Computing
FOSS4G 2010
2009 Utility Computing
Software as a Service (Saas)
Cloud Computing
www.52north.org/security
Categories Software as a Service (SaaS)
- Dyncamic Software and data provisioning (outsourcing, on-demand) - Allows pay-per-use revenue models
Platform as a Service (PaaS)
- Software development and deployment platform - Quality of Service, QoS (scalability) managed by cloud provider
Infrastructure as a Service (IaaS)
- Virtualized and dynamically managed (elasticity) IT infrastructure - Dynamic resource (server, storage) provisioning (ondemand) - Delivers computational infrastructures as services over the network
Server FOSS4G 2010
Storage www.52north.org/security
IT investments & maintenance Taifun?
requests
80.000$ 40.000$ 20.000$
time FOSS4G 2010
www.52north.org/security
IT investments & maintenance 120.000$
requests
80.000$ 40.000$ 20.000$
time FOSS4G 2010
www.52north.org/security
IT investments & maintenance 120.000$
requests
80.000$ 40.000$ 20.000$
time FOSS4G 2010
www.52north.org/security
Hybrid Clouds
Hybrid Cloud
Private Cloud
FOSS4G 2010
Public Cloud
www.52north.org/security
Hybrid Clouds
Hybrid Cloud Load Balancer
Public Cloud
Private Cloud WMS
WMS
WMS
WMS
WMS
WMS FOSS4G 2010
www.52north.org/security
Static Model
FOSS4G 2010
www.52north.org/security
Architecture Intel Core 2 Duo CPU E6850 3.00GHz
Intel Pentium D CPU 2.80GHz
4GB RAM
2GB RAM
Intel Core 2 Duo CPU E8500 3.16GHz 4GB RAM
FOSS4G 2010
www.52north.org/security
Architecture
FOSS4G 2010
www.52north.org/security
Architecture
Head Node
Worker Node 1 FOSS4G 2010
Worker Node 2 www.52north.org/security
Architecture
Head Node
Worker Node 1 FOSS4G 2010
Worker Node 2 www.52north.org/security
Head Node
Cloud Controller Cluster Controller
FOSS4G 2010
www.52north.org/security
Architecture
Head Node
Worker Node 1 FOSS4G 2010
Worker Node 2 www.52north.org/security
Worker Node
VM VM VM VM
FOSS4G 2010
sysstat: CPUMon
www.52north.org/security
Big Picture
VM VM VM VM
FOSS4G 2010
VM VM VM VM
www.52north.org/security
Dynamic Model
FOSS4G 2010
www.52north.org/security
Big Picture 1
VM
FOSS4G 2010
1
1
www.52north.org/security
Big Picture 1
VM
FOSS4G 2010
1
1
www.52north.org/security
Big Picture 1
VM
FOSS4G 2010
1
1
www.52north.org/security
Big Picture 1
VM
FOSS4G 2010
1
1
www.52north.org/security
Big Picture 1
VM
FOSS4G 2010
1
1
www.52north.org/security
Big Picture 1
VM
FOSS4G 2010
1
1
www.52north.org/security
Big Picture 1
VM
FOSS4G 2010
1
1
www.52north.org/security
Big Picture 1,2
1
1
VM 2 VM
FOSS4G 2010
www.52north.org/security
Big Picture 1,2
1
1
VM 2 VM
FOSS4G 2010
www.52north.org/security
Big Picture 1,2
1,2
1
VM 2 VM
FOSS4G 2010
www.52north.org/security
Big Picture 1,2
1,2
1
VM 2 VM
FOSS4G 2010
www.52north.org/security
Big Picture 1,2
1,2
1
VM 2 VM
FOSS4G 2010
www.52north.org/security
Big Picture 1,2,3,4
1
VM 2 VM
FOSS4G 2010
1,2,3,4
3
VM 4 VM
5
VM 6 VM
www.52north.org/security
Big Picture 1,2,3,4
1
VM 2 VM
FOSS4G 2010
1,2,3,4
3
VM 4 VM
5
VM … VM n VM
www.52north.org/security
Dashboard
FOSS4G 2010
www.52north.org/security
Transparent
FOSS4G 2010
www.52north.org/security
Summary • • • • •
Hybrid Cloud Evolution Cost effective and elastic setup Scaleable Transparent Manageable
FOSS4G 2010
www.52north.org/security
Future Work • Performance Tests • ROI/Break Even
FOSS4G 2010
www.52north.org/security