Page 315 - Cloud computing: From paradigm to operation
P. 315

Framework and requirements for cloud computing                              1


            II.1    Use case 1 – Cloud service rebranding

            CSP-A wishes to offer browser-based office productivity suite services to their users but does not want to run
            a data centre or build the applications. CSP-A resells the office suite services built and operated by CSP-D,
            using CSP-A branding, IP network connectivity (IC2), and customer management, while CSP-D develops and
            maintains the applications and runs the service.

            II.2    Use case 2 – Discovery
            CSP-A offers a directory service for cloud services to their users. CSP-D and CSP-C both advertise their cloud
            service  offerings  into  CSP-A's  directory  (IC2).  Enterprise  CSC  wishes  to  find  a  disaster  recovery  backup
            provider, uses CSP-A's directory (IC3) to determine that CSP-D offers this service at a good price, and connects
            with CSP-D via CSP-A's network (IC4) to use the service.

            II.3    Use case 3 – Intermediary
            CSP-A  offers  an  intermediary  service.  Enterprise  CSC  requests  the  CSP-A  to  provide  hosting  of  a  virtual
            machine (IC3), CSP-A determines that CSP-D offers the best match of requirements, reserves the resources
            at CSP-D and creates the necessary connectivity (IC2). Enterprise CSC might or might not know the identity
            of CSP-D, depending on the requirements of the SLA.

            II.4    Use case 4 – Platforming

            CSP-D develops a cloud computing application to host consumer music collections under their own brand.
            CSP-D  subscribes  to  CSP-C's  PaaS  offering  (IC5)  and  deploys  their  SaaS  application  onto  CSP-C's  PaaS.
            Consumers connect their devices to CSP-A's application, which is actually running at CSP-C's datacentre (IC2)
            via virtual private network (VPN).

            II.5    Use case 5 – Offloading
            Enterprise CSC runs an engineering simulation package which requires significant amounts of computing
            power  at  infrequent  intervals.  CSC's  private  cloud  does  not  have  sufficient  peak  capacity  to  handle  this
            effectively,  so  they  have  contracted  with  CSP-A  to  provide additional  compute  power (IC3). Due  to  the
            success of CSC's business, they now need more peak computing power than CSP-A can provide from CSP-A's
            own cloud data centre, so CSP-A reserves additional computing resources from CSP-D, handles the load and
            bills CSC accordingly.

            II.6    Use case 6 – Virtual data centre expansion
            CSP-A  has  encountered  resistance  to  expansion  of  their  cloud  data  centres  due  to  environmental
            considerations. CSP-A therefore orders 1000 new virtual machine (VM) instances from CSP-D and establishes
            a VPN bridge such that the new VMs appear to be on the same virtual local area network (LAN) as used in
            their own data centre.


            II.7    Use case 7 – Distributed media
            A broadcaster (CSC) will be hosting a major television sporting event series with a global audience and wishes
            to offer both live and on-demand streaming of the event to many types of devices. CSC requests CSP-A to
            provide global distribution. CSP-A establishes connection of the live source feeds to CSP-D, which provides
            secure media reformatting as part of their PaaS offering (IC2), returning digital rights management (DRM)-
            protected  streams/files  suitable  for  playing  on  many  types  of  devices.  CSP-A  also  develops  a  global
            authentication tool and deploys this on PaaS offerings from other CSPs worldwide (IC1, IC2). CSP-A also books
            capacity  in  content  distribution  network  (CDN)  services  worldwide.  When  the  event  begins,  millions  of
            consumer  devices  are  able  to  authenticate  themselves  on  their  local  network  provider  and  stream  the
            content from an efficient local source.








                                                                                                         307
   310   311   312   313   314   315   316   317   318   319   320