Chapter 6 The Cloud Jason C. H. Chen, Ph.D. Professor of MIS School of Business Administration Gonzaga University Spokane, WA 99258 chen@gonzaga.edu Dr. Chen, Management Information Systems 1 Study Questions Q1: Why is the cloud the future for most organizations? Q2: What network technology supports the cloud? Q3: How does the cloud work? Q4: How do organizations use the cloud? Q5: How can AllRoad Parts use the cloud? Q6: How can organizations use cloud services securely? Q7: 2025? Dr. Chen, Management Information Systems 2 Q1: Why Is the Cloud the Future for Most Organizations? • The Cloud – Elastic leasing of pooled computer resources via Internet • Elastic • Leased computing resources, dynamically increased/decreased, programmatically, organizations only pay for resources actually used • Flexibility for unpredictable demand while limiting financial risks Dr. Chen, Management Information Systems 3 Pooled • Cloud resources pooled • Many organizations share same physical hardware through virtualization • Benefit from economies of scale • Average cost of production decreases as size of operation increases • Major cloud vendors operate enormous data centers (Web farms) On markets the consumers usually “_____" the goods or information they demand for their needs, while the offerers or suppliers “_____" them toward the consumers. Dr. Chen, Management Information Systems 4 Cloud Computing Services Dr. Chen, Management Information Systems Three main Categories of Cloud Computing Services • __________ as a service (SaaS) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software“ • _________ as a service (PaaS) is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage web applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app • _____________ as a Service (IaaS) is a form of cloud computing that provides virtualized computing resources over the Internet. Dr. Chen, Management Information Systems 6 Q4: How Do Organizations Use the Cloud? Three Fundamental Cloud Types Fig 6-16 Three Fundamental Cloud Types Dr. Chen, Management Information Systems 7 Why Now? • Time-sharing vendors sold slices of computer time on a use-fee basis since 1960s • Cloud-based hosting advantages • Cheap processors, essentially free data communication and data storage • Instantaneous creation of new virtual machine environments • Internet-based standards enable cloud-hosting vendors to provide flexible, standardized processing capabilities Dr. Chen, Management Information Systems 8 When Does the Cloud Not Make Sense? • When law or standard industry practice require physical control or possession of the data. • Financial institution might be legally required to maintain physical control over its data. Dr. Chen, Management Information Systems 9 http://www.salesforce.com/cloudcomputing/?fromSearch=true 3m17s Dr. Chen, Management Information Systems 10 Topics in Networks • Three popular networks – LAN • Local Area Network – MAN • Metropolitan Area Network – WAN • Wide Area Network – Internet • WAN is the focus for this chapter Dr. Chen, Management Information Systems Q2: What Network Technology Supports the Cloud? Dr. Chen, Management Information Systems 12 LAN Protocol • IEEE 802.3 • Wired LAN • 10/100/1000 Mbps • Ethernet • IEEE 802.11 – Wireless LAN – 802.11n – Up to 600 Mbps – Bluetooth Dr. Chen, Management Information Systems • 802.11ac - speeds up to 1.3 Gbps • Bluetooth –For transmitting data short distances –Connect computer, keyboard, mouse, printer, smartphones, automobile entertainment systems 13 FileZilla: Protocols Supporting File Transmission (FTP) SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities Dr. Chen, Management Information Systems 14 Abbreviations Used for Communications and Computer Memory Speeds • Communications equipment, k = 1,000, not 1,024 as for computer memory • M = 1,000,000, not 1,024 × 1,024; • G = 1,000,000,000, not 1,024 × 1,024 × 1,024. Thus, 100 Mbps =100,000,000 bits per second • Communications speeds expressed in bits; however, computer memory sizes expressed in _____ Dr. Chen, Management Information Systems 15 What are the components of a LAN? MAC and IP addresses will be discussed in the next section. A switch is a specialpurpose computer that receives and transmits messages to computers in the LAN. Media access control (MAC) address serves as a unique identifier for each NIC on a LAN. Fig 6 (extra): Local Area Network (LAN) Dr. Chen, Management Information Systems A media access control (MAC) address (physical addresses) serves as a unique identifier for each NIC (Network Interface Card) on a LAN. Wireless Connections: What Are the Components of a LAN? • IEEE 802.11 wireless protocol uses wireless NICs (WNIC) to connect devices to networks similar to how wired NICs operate. • Figure depicts a combination of NICs and WNICs on a LAN. • Access points (AP) use 802.3 protocol to communicate with a switch and 802.11 protocol to send and receive wireless traffic. LAN with Wireless Dr. Chen, Management Information Systems 17 Connecting to the Internet • Connecting personal computers to an ISP requires that digital signals coming out of the computer are converted to analog signals. Analog signals coming into a personal computer must be converted to digital signals. Comparison of digital and analog signals. digital signal (0/1) analog signal (wavy) Fig 6-Extra Analog Versus Digital Signals Dr. Chen, Management Information Systems 18 What are the alternatives for a WAN? How Does the Cloud Work? Modems are used to convert the signals back and forth as shown in the figure below. You are in Spokane digital signal analog signal The cloud resides in the Internet Dr. Chen, Management Information Systems Fig 6-Extra Personal Computer Internet Access and Fig 6-7 Using the Internet for a Hotel Reservation 19 Network Addresses: MAC and IP • MAC addresses Physical addresses Each NIC (Network Interface Controller) card given an address by manufacturer Address only shared within network or segment • IP addresses ________ addresses Written as series of dotted decimals 192.68.2.28 Not permanently associated with hardware device Can be reassigned as necessary Assignment controlled by ICANN (Internet Corporation for Assigned Names and Numbers) Dr. Chen, Management Information Systems 20 Public IP Addresses and Domain Names IPv4 • Four decimal dotted notation ==> 165.193.123.253 URL - ________ _______ ______ • User-friendly document Web address • Internet address using a protocol, such as http:// or ftp:// Domain name • Worldwide-unique name affiliated with a public IP address • URL: http://www.example.net/home.html Top-level domain name: net Second-level domain name: example Host name: www Dr. Chen, Management Information Systems 21 What Is Service-Oriented Architecture (SOA)? Web service • Encapsulated software service provided anywhere over the Internet • No department needs knowledge of who works in another department, or how it accomplishes its work. • Each department free to change personnel task assignments, change processes for performing its services • Service description documents how to use service, and publishes description using Web Service Description Language (WSDL) • Used by SAP, Oracle ERP The cloud would be impossible without a design philosophy of ________. Dr. Chen, Management Information Systems 22 SOA Analogy: Approval Request Interactions Among Three Departments Using SOA principles, each department would formally define the services that it provides. For the Credit Department: • CheckCustomerCredit • ApproveCustomerCredit For the Inventory Department: • Each department formally states data it expects to receive with request and data it promises to return in response. • Every interaction is done exactly same way Dr. Chen, Management Information Systems • VerifyInventoryAmount • AllocateInventory • ReleaseAllocatedInventory Fig 6-12 Approval Request Interactions Among Three Departments 23 What Processing Occurs on a Typical Web Server? • Almost all e-commerce applications use the threetier architecture, which is an arrangement of user computers and servers into three categories, or tiers (see Fig. 6-10). – User tier: consists of computers, phones, and other devices that have browsers that request and process web pages. – (Web)Server tier: consists of computers that run Web servers and process application programs. – Database tier: consists of computers that run a DBMS that processes requests to retrieve and store data. Dr. Chen, Management Information Systems SOA Principles Applied to Three-tier Architecture What is the main advantage? User Tier Services • ObtainPartData • ObtainPartImages • ObtainPartQuantityO nHand • OrderPart • JavaScript written to invoke these services correctly. Fig 6-13 SOA Principles Applied to Three-Tier Architecture Dr. Chen, Management Information Systems 25 Q6: How Can Organizations Use Cloud Services Securely? • Virtual Private Networks (VPNs) create the appearance of private point-to-point connections by using tunnels to create virtual, private pathways over the Internet. • Figure below shows connections a VPN uses. The cloud resides in the Internet Fig. 6-20 Remote Access Using VPN: Actual Connections Dr. Chen, Management Information Systems 26 Why Do Organizations Use Virtual Private Networks? This figure shows how a WAN uses three different VPN tunnels to connect geographically separated users. Secure but costly !!! The cloud resides in the Internet Fig 6-Extra: WAN Using VPN Dr. Chen, Management Information Systems 27 Using Web Services Internally What is the difference between this and the next one? Fig 6-19 Web Services Principles Applied to Inventory Applications Dr. Chen, Management Information Systems 28 Private Cloud for Inventory and Other Applications Dr. Chen, Management Information Systems 29 Private Cloud for Inventory and Other Applications User Tier Dr. Chen, Management Information Systems 30 Q7: 2025 • • • • • Cloud services faster, more secure, easier to use, cheaper Fewer organizations set up own computing infrastructure More pooling of servers across organizations More economies of scale achieved by cloud vendors Individuals, small businesses, large organizations readily obtain elastic resources at very low cost • Everything will be connected to everything else, with most data stored in the cloud • Large server farms employing few employees reduces number of small companies that install and maintain inhouse email exchanges and other servers, and jobs. Dr. Chen, Management Information Systems 31 Q7: 2025 (cont'd) • Cheap, elastic cloud services enable new small startup Enable organizations to develop more information systems, cheaply, quickly, and increase demand for employees who know how to use and manage information systems • New categories of work • Mobile systems will be standard • More remote action systems – – – – – Telediagnosis Telesurgery Telelaw enforcement Drones and other military equipment Live remote digital broadcasting Dr. Chen, Management Information Systems 32 • END of CHAPTER 1 Dr. Chen, Management Information Systems 33