0
3.2kviews
What are public cloud adoption phases for SMBs? What are cloud adoption vendor roles and responsibilities towards SMBs?

Mumbai University > Information Technology > Sem 7 > Cloud Computing

Marks: 10M

Year: Dec 2015

1 Answer
0
18views

enter image description here

  • Cloud services are demanded by computing and IT administrators, software vendors and end users.
  • The above figure introduces five level of cloud players.
  • At the top level, individual users and organizational users demand very different services.
  • The application providers at the SaaS level serve mainly individual users.
  • Most business organizations are serviced by IaaS and PaaS providers.
  • The infrastructure services(IaaS) provide the compute, storage and communication resources to both applications and organizational users.
  • The cloud environment is defined by the PaaS or platform providers.
  • Cloud services rely on new advances in machine virtualization, SOA, grid infrastructure management and power efficiency.
  • Consumers purchase such services in the form of IaaS, PaaS or SaaS.
  • Many cloud entrepreneurs are selling value added utility services to massive number of users.
  • The cloud industry leverages the growing demand by many enterprises and business users to outsource their computing and storage jobs to professional providers.
  • The provider service charges are often much lower than the cost for users to replace their obsolete servers frequently.

enter image description here

  • The above figure shows IaaS, PaaS and SaaS models which allow the users to access services over the internet relying entirely on the infrastructures of cloud service providers.
  • These models are offered based on various SLAs between the providers and the users.
  • SLAs are more common in network services as they account for the QoS characteristics of network services.
  • For cloud computing services, it is difficult to find a reasonable precedent for negotiating an SLA.

The SLA for cloud computing address service availability, data integrity, privacy and security protection.

Please log in to add an answer.