Sehgal / Bhatt | Cloud Computing | E-Book | www.sack.de
E-Book

E-Book, Englisch, 284 Seiten

Sehgal / Bhatt Cloud Computing

Concepts and Practices
1. Auflage 2018
ISBN: 978-3-319-77839-6
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark

Concepts and Practices

E-Book, Englisch, 284 Seiten

ISBN: 978-3-319-77839-6
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc.  Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architecture, with focus on best practices for using a dynamic cloud infrastructure, cloud operations management and cloud security.  The authors explain carefully the 'why's and how's' of Cloud Computing, so engineers will find this book and invaluable introduction to the topic.

Naresh K. Sehgal has been working at Intel since 1988, prior to that completed his B.E. from Punjab Engineering College (India), M.S. and Ph.D. from Syracuse University (New York). Naresh has taught a Cloud Computing class at Santa Clara University (California), where he also earned a MBA. Pramod Chandra (PCP) Bhatt started his teaching career in 1965 at IIT Kanpur, and then moved to IIT Delhi in 1969, and retired from IIT Delhi in 1996. Prof Bhatt also worked as a visiting professor at the University of Ottawa, McGill University, Montreal (Canada), Universities of Dortmund, Paderborn and Bochum (Germany), Kochi University of Technology (Japan), Indian Institute of Information Technology (IIIT) and Indian Institute of Science (IISc) at Bangalore. Professor Bhatt has a M.E. from Calcutta University and a PhD from IIT Kanpur. He has also been a Konrad Zuse Fellow at the University of Dortmund.

Sehgal / Bhatt Cloud Computing jetzt bestellen!

Weitere Infos & Material


1;Foreword by Diane M. Bryant;6
2;Foreword by Professor V. Rajaraman;6
3;Preface;10
4;Acknowledgements;12
5;Contents;13
6;About the Authors;18
7;Abbreviations;19
8;Definitions;21
9;1 Introduction;24
9.1;1.1 Motivation;24
9.2;1.2 Cloud Computing Definitions;25
9.3;1.3 Cloud Computing Operational Characteristics;26
9.3.1;1.3.1 Cloud Computing Benefits;29
9.3.2;1.3.2 Cloud Computing Potential Risks;29
9.4;1.4 Cloud Computing Trends;29
9.4.1;1.4.1 Trend #1: Abstraction of Network, Storage, Database, Security, and Computing Infrastructure;29
9.4.2;1.4.2 Trend #2: A Pricing Model that Is Retail in Its Conception;30
9.4.3;1.4.3 Trend #3: Service-Level Agreements (SLAs);30
9.5;1.5 Cloud Computing Needs;31
9.6;1.6 Points to Ponder;32
9.7;References;33
10;2 Foundations of Cloud Computing;34
10.1;2.1 Historical Evolution;34
10.2;2.2 Different Network Protocols;36
10.3;2.3 Evolution of Enterprise IT;39
10.4;2.4 Evolution of Web Services;40
10.5;2.5 Server Operations in a Data Center;43
10.6;2.6 Server-Based Web Services;48
10.7;2.7 Service-Oriented Architecture;49
10.8;2.8 Building an Enterprise SOA Solution;51
10.9;2.9 Top-Down Versus Bottom-Up Approach;53
10.10;2.10 Enterprise Service Bus (ESB);54
10.11;2.11 Enterprise Implementation on Private Clouds;56
10.12;2.12 Enterprise Implementation on Hybrid Clouds;58
10.13;2.13 Web Threat Models;58
10.14;2.14 Open Web Application Security Project;60
10.15;2.15 Summary;62
10.16;2.16 Points to Ponder;62
10.17;References;63
11;3 Cloud Computing Pyramid;64
11.1;3.1 Roots of Cloud Computing;64
11.2;3.2 Essential Characteristics of Cloud Computing;67
11.3;3.3 Cloud Players and Their Concerns;68
11.4;3.4 Considerations for Cloud Data Centers;70
11.4.1;3.4.1 Migration;71
11.4.2;3.4.2 Performance;71
11.5;3.5 Points to Ponder;72
11.6;References;72
12;4 Features of Private and Public Clouds;74
12.1;4.1 Customer Expectations of Cloud Computing;74
12.2;4.2 Interoperability of Cloud Computing;76
12.3;4.3 Reliability of Cloud Computing;76
12.4;4.4 Performance of Cloud Computing;78
12.5;4.5 A Sample Study;79
12.6;4.6 Summary;82
12.7;4.7 Points to Ponder;82
12.8;References;83
13;5 Cloud Workload Characterization;84
13.1;5.1 Motivation;84
13.2;5.2 Some Background on Workload Characterization;85
13.3;5.3 Top-Level Cloud Workload Categorization;88
13.4;5.4 Cloud Workload Categories;89
13.5;5.5 Computing Resources;93
13.5.1;5.5.1 Data Buses Between Servers;94
13.6;5.6 Example Workload Categorizations;95
13.7;5.7 Temporal Variability of Workloads;95
13.8;5.8 Low-Level or Hardware Metrics of Computer Utilization;99
13.9;5.9 Dynamic Monitoring and Cloud Resource Allocation;100
13.10;5.10 Benefits to Cloud Service Providers;101
13.11;5.11 Summary;103
13.12;5.12 Points to Ponder;104
13.13;References;104
14;6 Cloud Management and Monitoring;107
14.1;6.1 Motivation;107
14.2;6.2 Introduction to Cloud Setup and Basic Tools;107
14.3;6.3 Noisy Neighbors in a Cloud;108
14.4;6.4 Cloud Management Requirements;109
14.5;6.5 Essentials of Monitoring;110
14.6;6.6 Some Example of Monitoring Tools;111
14.7;6.7 Future Work;113
14.8;6.8 Points to Ponder;114
14.9;References;114
15;7 Cloud Computing and Information Security;115
15.1;7.1 Background and Definitions;115
15.2;7.2 Security Concerns of Cloud Operating Models;117
15.3;7.3 Identity Authentication;118
15.4;7.4 Secure Transmissions;122
15.5;7.5 Secure Storage and Computation;122
15.6;7.6 The Security Players;123
15.7;7.7 Traditional Versus Internet Security Issues;124
15.8;7.8 Variations and Special Cases for Security Issues with Cloud Computing;127
15.8.1;7.8.1 The Players;127
15.8.2;7.8.2 Secure Communication;128
15.8.3;7.8.3 An Example Security Scenario for Cloud Computing;129
15.9;7.9 A Few Key Challenges Related to Cloud Computing and Virtualization;130
15.10;7.10 Some Suggested Security Practices for Cloud Computing;132
15.11;7.11 Summary;133
15.12;7.12 Points to Ponder;134
15.13;References;134
16;8 Migrating to Cloud;136
16.1;8.1 Cloud Business Models;136
16.2;8.2 A Case Study: B2C;137
16.3;8.3 A Case Study: B2B;138
16.4;8.4 A Case Study: C2C;140
16.5;8.5 Summary;141
16.6;8.6 Points to Ponder;141
16.7;References;142
17;9 Migrating a Complex Industry to Cloud;143
17.1;9.1 Background;143
17.2;9.2 Introduction to EDA;144
17.3;9.3 A Brief History of EDA Tools and Flows;145
17.3.1;9.3.1 The Nascent Years of the 70s;145
17.3.2;9.3.2 The Roaring 80s;146
17.3.3;9.3.3 Growing up in the 90s;146
17.3.4;9.3.4 Maturing into the First Decade of Twenty-First Century;147
17.3.5;9.3.5 From 2010s till Now, EDA Stable;147
17.4;9.4 EDA Flow Steps Mapping to Cloud;148
17.5;9.5 Considerations for Cloud Computing Adoption;153
17.6;9.6 Summary;156
17.7;9.7 Points to Ponder;157
17.8;References;158
18;10 Costing and Billing Practices in Cloud;160
18.1;10.1 Cloud as a Service (CaaS): The Billing Imperatives;160
18.1.1;10.1.1 Billing and Best Practices;160
18.2;10.2 Pay as You Go;161
18.3;10.3 Amazon EC2 Motivations and Setup;162
18.3.1;10.3.1 Amazon’s On-Demand Instances;163
18.3.2;10.3.2 Amazon Spot Instances;163
18.3.3;10.3.3 Amazon Reserved Instances;164
18.3.4;10.3.4 Amazon Dedicated Instances and Dedicated Hosts;164
18.4;10.4 Motivation and Methods for Right Sizing Customer VMs;165
18.4.1;10.4.1 Elastic IP;165
18.4.2;10.4.2 Elastic Load Balancing;166
18.4.3;10.4.3 Auto-Scaling;167
18.5;10.5 Cost Minimization;168
18.6;10.6 Capacity Forecasting;171
18.7;10.7 Optimizations Across Clouds;172
18.8;10.8 Types of Cloud Service-Level Agreements;174
18.9;10.9 Summary;176
18.10;10.10 Points to Ponder;176
18.11;References;177
19;11 Analytics in the Cloud;178
19.1;11.1 Background and Problem Statement;178
19.2;11.2 Introduction to MapReduce;181
19.3;11.3 Introduction to Hadoop;181
19.4;11.4 Usage of Amazon’s MapReduce;184
19.5;11.5 Twitter Sentimental Analysis Using Cloud;186
19.6;11.6 Future Possibilities;187
19.7;11.7 Points to Ponder;188
19.8;References;188
20;12 Future Trends in Cloud Computing;189
20.1;12.1 Revisiting History of Computing;189
20.2;12.2 Current Limitations of Cloud Computing;189
20.3;12.3 Emergence of Internet of Things (IoT);191
20.4;12.4 Emergence of Machine Learning;192
20.5;12.5 Emergence of Edge Computing;194
20.6;12.6 Security Issues in Edge Computing;195
20.7;12.7 Security Considerations for Edge Computing;196
20.8;12.8 Future Work Needed;198
20.9;12.9 Example of an IoT-Based Cloud Service;199
20.10;12.10 Summary;200
20.11;12.11 Points to Ponder;201
20.12;References;201
21;13 A Quick Test of Your Cloud Fundamentals Grasp;202
22;14 Hands-On Project to Use Cloud Service Provider;212
22.1;14.1 Project 1: Install Lamp Stack on Amazon EC2;212
22.1.1;14.1.1 Installing Lamp Web Server on AWS via EC2;212
22.1.2;14.1.2 Installing Wordpress;222
22.1.3;14.1.3 Wordpress URL;234
22.2;14.2 Project 2: Install PHP on Your AWS Instance;234
22.3;14.3 Project 3: Enhance Security of Your AWS Instance;236
22.4;14.4 Project 4: Setup a Load Balancer for Your AWS Instance;238
22.4.1;14.4.1 Elastic Load Balancer Setup;238
22.4.2;14.4.2 Unique Features of AWS Load Balancer;243
22.5;14.5 Project 5: Use Elastic IP for Your AWS Instance;244
22.5.1;14.5.1 How to Make an Instance Elastic;244
22.5.2;14.5.2 Extra: Elastic IP;244
22.6;14.6 Bonus;246
22.7;14.7 Points to Ponder;256
23;Appendix A;257
24;Appendix B: Additional Considerations for Cloud Computing;275
25;Appendix C: Suggested List of Additional Cloud Projects;280
26;Index;282



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.