/
The Cloud Chapter 6 “ How The Cloud Chapter 6 “ How

The Cloud Chapter 6 “ How - PowerPoint Presentation

karlyn-bohler
karlyn-bohler . @karlyn-bohler
Follow
348 views
Uploaded On 2018-11-08

The Cloud Chapter 6 “ How - PPT Presentation

About 10 Per T erabyte Lease storage capacity from third party All incoming data from drones automatically uploaded Average monthly storage costs cut at least 50 Power savings backup time saved no ID: 722332

education pearson copyright 2017 pearson education 2017 copyright cloud data services internet organizations web security 000 lan content falcon

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "The Cloud Chapter 6 “ How" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

The Cloud

Chapter 6Slide2

How

About $10 Per Terabyte.”

Lease storage capacity from third party.All incoming data from drones automatically uploaded.Average monthly storage costs cut at least 50%.Power savings, backup time saved, no new hardware configuration.One-time set up and development costs.

Copyright © 2017 Pearson Education, Inc.Slide3

Study Questions

Q1:

Why is the cloud the future for most organizations?Q2:

What network technology supports the cloud?Q3: How does the cloud work?Q4: How do organizations use the cloud?Q5: How can Falcon Security use the cloud?Q6: How can organizations use cloud services securely?Q7: 2026?Copyright © 2017 Pearson Education, Inc.Slide4

Q1: Why Is the Cloud the Future for Most Organizations?

The Cloud

Elastic

leasing of pooled computer resources via Internet.ElasticAutomatically adjusts for unpredictable demand, Limits financial risks.PooledSame physical hardwareEconomies of scale

Copyright © 2017 Pearson Education, Inc.Slide5

Example of a Video Banner Ad Customer

Copyright © 2017 Pearson Education, Inc.Slide6

Pooled

E

conomies of scale

Average cost decreases as size of operation increases.Major cloud vendors operate enormous data centers (Web farms).Copyright © 2017 Pearson Education, Inc.Slide7

Apple Data Center

in Maiden

, NC

Billion-dollar facility contains more than 500,000 sq. ft.Copyright © 2017 Pearson Education, Inc.Slide8

Why Is the Cloud Preferred to

In-House Hosting

?

Copyright © 2017 Pearson Education, Inc.Slide9

Why Is the Cloud Preferred to

In-House Hosting? (cont'd)

Copyright © 2017 Pearson Education, Inc.Slide10

Why Now?

Cheap processors, essentially free data communication and storage.

Virtualization technology.

Internet-based standards enable flexible, standardized processing capabilities.Copyright © 2017 Pearson Education, Inc.Slide11

When Does the Cloud Not Make Sense?

When law

or standard industry practice require physical control or possession of the

data.Financial institutions legally required to maintain physical control over its data.Copyright © 2017 Pearson Education, Inc.Slide12

Ethics Guide: Cloudy Profit?

Data

broker (or data

aggregator).Acquiring and analyzing market, buyer, and seller data for real estate agents.Alliance transitioned data storage and processing from own Web farm to the cloud.Improved speed and quality of data services

at fraction of

prior

costs, cut in-house hardware

support staff by

65%.

P

lowing

money back into

R&D.

Copyright © 2017 Pearson Education, Inc.Slide13

Q2: What Network Technology Supports the Cloud?

Copyright © 2017 Pearson Education, Inc.Slide14

Typical Small Office/Home

Office (

SOHO) LAN

Copyright © 2017 Pearson Education, Inc.Slide15

LAN Protocol

IEEE 802.3

Wired LAN

10/100/1000 Mbps EthernetIEEE 802.11Wireless LAN802.11acSpeeds up to 1.3 Gbps

Bluetooth

Transmits

data

short distances.

Connect computer, keyboard, mouse, printer, smartphones,

smartwatches, automobiles,

sports equipment,

clothing.

Copyright © 2017 Pearson Education, Inc.Slide16

Abbreviations Used for Communications and Computer Memory Speeds

Communications

equipment,

K(ilo) = 1,000, not 1,024 (as for memory); M(ega) = 1,000,000, not 1,024 × 1,024; G(iga) = 1,000,000,000, not 1,024 × 1,024 × 1,024.

100

Mbps =

100,000,000

bits per second.

Communications speeds expressed

in

bits

,

memory sizes in

bytes

.

Copyright © 2017 Pearson Education, Inc.Slide17

Connecting Your LAN to the

Internet

Important ISP functions:

Provide legitimate Internet address. Provide gateway to Internet.Pay access fees and other charges to telecoms.WAN wireless average performance 1 Mbps, with peaks of up to 3.0 Mbps.Typical wireless LAN 50 Mbps.

Copyright © 2017 Pearson Education, Inc.Slide18

Summary of LAN Networks

Copyright © 2017 Pearson Education, Inc.Slide19

Q3:

How Does the Cloud Work?

The cloud resides in the

Internet

Copyright © 2017 Pearson Education, Inc.Slide20

Carriers and Net Neutrality

Messages, broken into

packets. Packets move across

Internet, passing through networks owned by telecom carriers.Peering agreements - Carriers freely exchange traffic amongst themselves without paying access fees. Net neutrality principleAll data treated equally.Problem: some people use more bandwidth than others.

Copyright © 2017 Pearson Education, Inc.Slide21

Internet Addressing

Public IP addresses

Identifies a unique device on

Internet.Assigned by ICANN (Internet Corporation for Assigned Names and Numbers.Private IP addresses Identifies a device on a private network, usually a LAN.Assignment LAN controlled.

Copyright © 2017 Pearson Education, Inc.Slide22

IP Addressing:

Major

Benefits

Public IP addresses conservedOne public IP address per LAN. Using private IP addresses

Eliminates

registering public IP address with ICANN-approved agencies.

Protects against direct attack.

Copyright © 2017 Pearson Education, Inc.Slide23

Public IP Addresses and Domain Names

IPv4

165.193.123.253

Domain nameUnique name affiliated with a public IP address.Dynamic affiliation of domain names with IP addresses.Multiple domain names for same IP address. URL (Uniform Resource LocatorInternet address

p

rotocol, such as

http:

//

or ftp

:

//.

Copyright © 2017 Pearson Education, Inc.Slide24

Domain Registry Company

Copyright © 2017 Pearson Education, Inc.Slide25

Processing on a Web Server

What

happens when

you visit a Web site and order something, and pay for it?Copyright © 2017 Pearson Education, Inc.Slide26

Three-tier Architecture

Copyright © 2017 Pearson Education, Inc.Slide27

Watch the Three Tiers in Action

!

Sample of Commerce Server Page

Commerce server requests shoe data from

DBMS.

DBMS

reads from

database, returns

data

to

commerce server.

Commerce server

formats Web page

with

data and sends html version of page to user’s computer.

Customer places items in shopping cart

.

Customer

checks out, commerce server program processes payment, schedules inventory processing, arranges

shipping, email receipt to customer.

Copyright © 2017 Pearson Education, Inc.Slide28

SOA Analogy: Approval

Request

Interactions Among Three Departments

CheckCustomerCredit• ApproveCustomerCredit• VerifyInventoryAmount

• AllocateInventory

• ReleaseAllocatedInventory

Copyright © 2017 Pearson Education, Inc.Slide29

Using SOA Principles, Each Department Defines:

CheckCustomerCredit

ApproveCustomerCredit

Inventory DepartmentVerifyInventoryAmountAllocateInventoryReleaseAllocatedInventoryEach department formally states data to receive with request and data promised to return in response.

Every interaction

done

exactly

same way.

Copyright © 2017 Pearson Education, Inc.Slide30

Using SOA

Principles:

EncapsulationNo department needs to know

who works in another department, or how dept. accomplishes work. Each department free to change personnel task assignments, change processes for performing services.Falcon Security could dynamically create 1,000 Inventory Departments and Sales Department with no need to change anything it does.

Copyright © 2017 Pearson Education, Inc.Slide31

SOA Principles Applied to

Three-tier Architecture

Services

ObtainPartDataObtainPartImages

ObtainPartQuantityOnHand

OrderPart

JavaScript

written to invoke these services correctly.

Copyright © 2017 Pearson Education, Inc.Slide32

Protocols Supporting Web Services

Copyright © 2017 Pearson Education, Inc.Slide33

WSDL, SOAP, XML, and JSON

WSDL (Web Services

Description Language)

Standard for describing services, inputs, outputs, other data supported by a Web service. Documents coded machine readable and used by developer tools for creating programs to access the service.

SOAP

(no longer an acronym)

Protocol for requesting Web services and for sending responses to Web service requests.

XML

(eXtensible Markup Language)

Used for transmitting documents. Contains metadata to validate format and completeness of a document, includes considerable overhead (see Figure 6-15a).

JSON

(JavaScript Object Notation)

Markup language used for transmitting documents. Contains little metadata. Preferred for transmitting volumes of data between servers and browsers. While notation in format of JavaScript objects, JSON documents can be processed by any language (see Figure 6-15b).

Copyright © 2017 Pearson Education, Inc.Slide34

Example XML and JSON

Documents

Copyright © 2017 Pearson Education, Inc.Slide35

Q4: How Do Organizations Use the Cloud?

Three

Fundamental

Cloud TypesCloud Services from Cloud Vendors

Copyright © 2017 Pearson Education, Inc.Slide36

Content Delivery Networks from

Cloud Vendors

Content delivery network (CDN)

Stores user data in many different geographical locations and makes data available on demand. Specialized type of PaaS, but usually considered in its own category.Minimizes latency.Used to store and deliver content seldom changed.

Copyright © 2017 Pearson Education, Inc.Slide37

CDN Benefits

Copyright © 2017 Pearson Education, Inc.Slide38

Servers Used in a Typical

CDN Service

Copyright © 2017 Pearson Education, Inc.Slide39

Using Web Services

Internally

Private Internet Infrastructure

Copyright © 2017 Pearson Education, Inc.Slide40

Q5: How Can Falcon Security Use

the

Cloud?SaaS products

Falcon Security could use.Google MailGoogle DriveOffice 365Salesforce.comMicrosoft CRM OnLinemany others . . .Copyright © 2017 Pearson Education, Inc.Slide41

PaaS Services from

Amazon DBMS

Products with Elastic Cloud 2 (EC2)

Falcon Security could use CDN

to distribute content worldwide and respond to leads generated from

advertising.

Copyright © 2017 Pearson Education, Inc.Slide42

IaaS Services at

Falcon Security

Provides

basic hardware in the cloud. May acquire servers to load operating systems. Considerable technical expertise and management.Alternative: Use elastic data storage services.

SaaS

and PaaS

provide more added value to Falcon Security.

Copyright © 2017 Pearson Education, Inc.Slide43

Q6: How

Can Organizations Use

Cloud Services Securely?

Remote Access Using VPN: Actual Connections

Copyright © 2017 Pearson Education, Inc.Slide44

Remote Access Using

VPN: Apparent

Connection

Copyright © 2017 Pearson Education, Inc.Slide45

Private Cloud for

Inventory and

Other Applications

Copyright © 2017 Pearson Education, Inc.Slide46

Accessing Private Cloud over a

Virtual Private

Network

Copyright © 2017 Pearson Education, Inc.Slide47

Using A Virtual Private Cloud

Subset of a Public Cloud With Highly Restricted, Secure

Access

Copyright © 2017 Pearson Education, Inc.Slide48

Q7: 2026

C

loud services

faster, more secure, easier to use, cheaper.Fewer organizations own their computing infrastructure.More pooling of servers across organizations.Overall size of the cloud gets bigger.Individuals, small businesses, large organizations obtain elastic resources at very low

cost.

Cloud fosters

new categories of

work.

Copyright © 2017 Pearson Education, Inc.Slide49

Q7: 2026 (cont’d)

Remote

action systems

TelediagnosisTelesurgeryTelelaw enforcementProvide services in dangerous locations.Watch top-notch performers and performances.Reduces value of local mediocrity.Copyright © 2017 Pearson Education, Inc.Slide50

So What? "Net Neutrality Enabled"

ISPs

little control over amount

, type, or origin of content.30% of U.S. Internet traffic during peak hours associated with using Netflix.Net neutralityAll users and content providers treated equally.No “fast” or

“slow”

lanes.

ISPs not

allowed to block, or

slow

, content associated with

competitors.

ISPs can’t

charge heavy Internet users additional fees or taxes.

Copyright © 2017 Pearson Education, Inc.Slide51

FCC Approved New Regulations (2015)

Renders

Internet a utility.Complaint: Interfering

with free markets.ISPs argue loss of potential revenue stream inhibits infrastructure development, limits growth, and stifles innovation. Larger war on net neutrality may have only just begun!Copyright © 2017 Pearson Education, Inc.Slide52

Security Guide: From Anthem to Anathema

G

reater accessibility

 data more accessible to hackers.80 million customers affected.Stole names, addresses, Social Security numbers, and salaries.Stored in plain text.Lawsuits filed.Premera Blue Cross Bank-account and medical data of 11 million customers.

Copyright © 2017 Pearson Education, Inc.Slide53

Guide: Is It Spying or Just Good

Management?

92%

of employers monitor employees’ email, telephone, and Internet use. Key loggersLog filesPacket sniffersText miningFirst Amendment Preserves free speech regarding laws Congress may enact, limited protection for

federal

employees

.

Does not

protect

you

at work

.

Copyright © 2017 Pearson Education, Inc.Slide54

Active Review

Q1:

Why is the cloud the future for most organizations?Q2:

What network technology supports the cloud?Q3: How does the cloud work?Q4: How do organizations use the cloud?Q5: How can Falcon Security use the cloud?Q6: How can organizations use cloud services securely?Q7: 2026?Copyright © 2017 Pearson Education, Inc.Slide55

Case Study 6: FinQloud Forever … Well, At Least For The Required Interval …

Securities

and Exchange Commission

(1937). Securities brokers' records must be stored on media that cannot be altered.Interpreted to enable storage of records on read-write medium, provided it includes software to prohibit data alteration (2003).Copyright © 2017 Pearson Education, Inc.Slide56

Components of the

FinQloud System

Copyright © 2017 Pearson Education, Inc.Slide57

FinQloud Forever

… (cont'd)

Creates “finger print” based on content of

record. SEC specifically excludes extrinsic controls: Authentication, passwords, and manual procedures,Believes such systems to could be readily misused to overwrite records.When properly configured, meets requirements of SEC’s Rule17a-3) and similar rules of Commodities Futures Trading Commission.

Copyright © 2017 Pearson Education, Inc.Slide58

Copyright © 2017 Pearson Education, Inc.