paper-2-communication services in cloud …tec.gov.in/pdf/studypaper/paper-2-communication...
TRANSCRIPT
1
Communication Services in
Cloud Computing Environment
J.M.Suri, DDG(I), TEC
B.K.Nath, Dir(I), TEC
Telecommunication Engineering Centre
Khurshid Lal Bhawan
Janpath, New Delhi -1
2
Contents
Page No.
1.0 Introduction 3
2.0 Cloud Computing Service Models 3
3.0 Communication as a Service (CaaS) Model 5
4.0 Some typical Offerings in CaaS model from
Service Providers on the Cloud
5
5.0 Advantages in a CaaS Implementation 6
6.0 Critical technological requirements for a cloud
ready storage Infrastructure
8
7.0 Accessing the cloud in an era of 3G mobile
communications
12
8.0 Growing use of smartphones to access the
Internet on mobiles – potential candidates for the
cloud
13
9.0 Why telecommunication operators should
become cloud providers?
13
10.0 Typical Service offerings on a cloud by
Telecommunication Operators
15
11.0 Examples of Cloud Based Services 17
12.0 Moving Beyond Flat rate pricing models in a
Cloud
17
13.0 Conclusion 18
14.0 References 18
Communication Services
1.0 Introduction
Cloud computing is a model for enabling convenient, on
shared pool of configurable computing resources (e.g., networks, servers, storage, applications,
and services) that can be rapidly provisioned and released with minimal manag
cloud provider interaction. Cloud computing technologies can be implemented in a wide variety
of architectures, under different service and deployment models. It can coexist with other
technologies and software design approaches. It can hav
networks of public and private organizations. Its adoption is growing as more and more
organizations are trying to optimize their IT infrastructure costs.
environments have become a reali
The most common services
Service), PaaS (Platform as a Service) and
developments have introduced more services
MaaS (Monitoring as a Service), which are catering to some specific needs only. These cloud
service models are briefly explained below.
(Cloud computing layers embedded in the "as a Service" components
2.0 Cloud Computing Service Models
(i) Software-as-a-Service
deployment whereby one or more applications and the computational resources to
run them are provided for use on demand as a turnkey service.
Communication Services in Cloud Computing
Environment
Cloud computing is a model for enabling convenient, on-demand network access to a
shared pool of configurable computing resources (e.g., networks, servers, storage, applications,
and services) that can be rapidly provisioned and released with minimal manag
cloud provider interaction. Cloud computing technologies can be implemented in a wide variety
of architectures, under different service and deployment models. It can coexist with other
technologies and software design approaches. It can have far-reaching effects on the systems and
networks of public and private organizations. Its adoption is growing as more and more
organizations are trying to optimize their IT infrastructure costs. Therefore, cloud computing
environments have become a reality today.
The most common services initially available through the cloud are SaaS (Software as a
Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). However, recent
developments have introduced more services like, CaaS (Communication as a Service) and
MaaS (Monitoring as a Service), which are catering to some specific needs only. These cloud
explained below.
Cloud computing layers embedded in the "as a Service" components
Computing Service Models
Service - Software-as-a-Service (SaaS) is a model of software
deployment whereby one or more applications and the computational resources to
run them are provided for use on demand as a turnkey service. Its main purpose is to
3
Cloud Computing
demand network access to a
shared pool of configurable computing resources (e.g., networks, servers, storage, applications,
and services) that can be rapidly provisioned and released with minimal management effort or
cloud provider interaction. Cloud computing technologies can be implemented in a wide variety
of architectures, under different service and deployment models. It can coexist with other
reaching effects on the systems and
networks of public and private organizations. Its adoption is growing as more and more
Therefore, cloud computing
SaaS (Software as a
(Infrastructure as a Service). However, recent
(Communication as a Service) and
MaaS (Monitoring as a Service), which are catering to some specific needs only. These cloud
Cloud computing layers embedded in the "as a Service" components)
Service (SaaS) is a model of software
deployment whereby one or more applications and the computational resources to
Its main purpose is to
4
reduce the total cost of hardware and software development, maintenance, and
operations. Security provisions are carried out mainly by the cloud provider. The
cloud subscriber does not manage or control the underlying cloud infrastructure or
individual applications, except for preference selections and limited administrative
application settings.
(ii) Platform-as-a-Service - Platform-as-a-Service (PaaS) is a model of software
deployment whereby the computing platform is provided as an on-demand service
upon which applications can be developed and deployed. Its main purpose is to
reduce the cost and complexity of buying, housing, and managing the underlying
hardware and software components of the platform, including any needed program
and database development tools. The development environment is typically special
purpose, determined by the cloud provider and tailored to the design and
architecture of its platform. The cloud subscriber has control over applications and
application environment settings of the platform. Security provisions are split
between the cloud provider and the cloud subscriber.
(iii) Infrastructure-as-a-Service. Infrastructure-as-a-Service (IaaS) is a model of
software deployment whereby the basic computing infrastructure of servers,
software, and network equipment is provided as an on-demand service upon which a
platform to develop and execute applications can be established. Its main
purpose is to avoid purchasing, housing, and managing the basic hardware and
software infrastructure components, and instead obtain those resources as virtualized
objects controllable via a service interface. The cloud subscriber generally has broad
freedom to choose the operating system and development environment to be hosted.
Security provisions beyond the basic infrastructure are carried out mainly by the
cloud subscriber.
(iv) Communication-as-a-Service (CaaS) - CaaS is an outsourced enterprise
communications solution. Providers of this type of cloud-based solution (known as
CaaS vendors) are responsible for the management of hardware and software
required for delivering some of the telecommunication services like Voice over IP
(VoIP) services, Instant Messaging (IM), and video conferencing capabilities to their
customers. This model has its evolution within the Telecommunication Industry
offering guaranteed QoS (Quality of Service) with well defined SLAs (Service Level
Agreements).
(v) Monitoring-as-a-Service (MaaS) - Monitoring-as-a-Service (MaaS) is the
outsourced provisioning of security, primarily on business platforms that leverage the
Internet to conduct business. It involves protecting an enterprise or government client
5
from cyber threats. Many industry regulations require organizations to monitor their
security environment, server logs, and other information assets to ensure the integrity
of these systems. However, conducting effective security monitoring can be a
daunting task because it requires advanced technology, skilled security experts, and
scalable processes - none of which come cheap. MaaS security monitoring services
offer real-time, 24/7 monitoring and nearly immediate incident response across a
security infrastructure by helping to protect critical information assets of their
customers.
3.0 Communication as a Service (CaaS) Model The majority of today’s cloud computing infrastructure consists of time-tested and
highly reliable services built on servers with varying levels of virtualized technologies,
which are delivered via large data centers operating under strict service-level agreements
that require 99.99% or better uptime. Commercial offerings have evolved to meet the
quality-of-service requirements of customers and operated through these SLAs.
CaaS service offerings are often bundled with traditional voice (or VoIP) and
data, advanced unified communications functionality such as video calling, web
collaboration, chat, realtime presence and unified messaging, a handset, local and long-
distance voice services, voice mail, advanced calling features (such as caller ID,
threeway and conference calling, etc.) and advanced PBX functionality. A CaaS solution
includes redundant switching, network, POP and circuit diversity, customer premises
equipment redundancy, and WAN fail-over that specifically addresses the needs of their
customers. All VoIP transport components are located in geographically diverse, secure
data centers for high availability and survivability. Network capacity and feature sets can
be changed dynamically, to keep pace with functionality demanded by consumer and
provider-owned resources are not wasted. From the customer’s perspective, there is very
little to virtually no risk of the service becoming obsolete, since the provider’s
responsibility is to perform periodic upgrades or replacements of hardware and software
to keep the platform technologically current. CaaS offers flexibility and scalability which
is very convenient for small and medium-sized businesses because of their tight budgets
and very little management oversight.
4.0 Some typical Offerings in CaaS model from Service Providers
on the Cloud
From the handset found on each employee’s desk to the PC-based software client
on employee laptops, to the VoIP private backbone, and all modes in between, every
component in a CaaS solution is managed 24/7 by the CaaS vendor.
6
4.1 Hosted and Managed Solutions
Over the past decade, with enhanced technology, networking, and software, the
remote management of infrastructure services has become a reality. CaaS delivers
a complete communications solution that is entirely managed by a single vendor.
Along with features such as VoIP and unified communications, the integration of
core PBX features with advanced functionality is managed by one vendor, who is
responsible for all of the integration and delivery of services to users.
4.2 Fully Integrated, Enterprise-Class Unified Communications
With CaaS, the vendor provides voice and data access and manages LAN/ WAN,
security, routers, email, voice mail, and data storage. By managing the
LAN/WAN, the vendor can guarantee consistent quality of service from a user’s
desktop across the network and back. Advanced unified communications features
that are most often a part of a standard CaaS deployment include:
(i) Chat
(ii) Multimedia conferencing
(iii) Microsoft Outlook integration
(iv) Real-time presence
(v) “Soft” phones (software-based telephones)
(vi) Video calling
(vii) Unified messaging and
(viii) Mobility
4.3 Telepresence
Telepresence has vastly simplified the way virtual collaboration takes
place, currently offering the most realistic meeting experience and an alternative
to traveling for face-to-face meetings with customers, suppliers, and staff as well
as other essential partners. Most important, it yields significant reductions in
travel costs, improved business productivity, and elimination of travel-induced
stress. Consolidation and centralization of communications infrastructure and
resources into IP-based unified communications and management systems can
result in drastic reductions in PBX lease costs, maintenance costs, and
management costs.
5.0 Advantages in a CaaS Implementation 5.1 No Capital Expenses Needed
When business outsource their unified communications needs to a CaaS service
provider, the provider supplies a complete solution that fits the company’s exact
needs. Customers pay a fee (usually billed monthly) for what they use. Customers
are not required to purchase equipment, so there is no capital outlay. Bundled in
7
these types of services are ongoing maintenance and upgrade costs, which are
incurred by the service provider.
5.2 Accelerated Decision Making
CaaS implementation allows a company’s workers, partners, vendors, and
customers to communicate and collaborate more effectively. Better
communication allows organizations to adapt quickly to market changes and to
build competitive advantage. CaaS can also accelerate decision making within an
organization. Innovative unified communications capabilities (such as presence,
instant messaging, and rich media services) help ensure that information quickly
reaches whoever needs it.
5.3 Flexible Capacity and Feature Set
When customers outsource communications services to a CaaS provider, they pay
for the features they need and when they need them. The service provider can
distribute the cost across a large customer base. This makes the use of shared
feature functionality more economical for customers to implement. Economies of
scale allow service providers enough flexibility that they are not tied to a single
vendor investment. They are able to leverage best-of-breed providers such as
Avaya, Cisco, Juniper, Microsoft, Nortel etc. more economically than any
independent enterprise.
5.4 No Risk of Obsolescence
Rapid technology advances, predicted long ago and known as Moore’s law, have
brought about product obsolescence in increasingly shorter periods of time. With
the constant introduction of newer models for all sorts of technology (PCs, cell
phones, video software and hardware, etc.), products now face much shorter life
cycles, sometimes as short as a single year. CaaS vendors must absorb this burden
for the user by continuously upgrading the equipment in their offerings to meet
changing demands in the marketplace.
5.5 No Facilities and Engineering Costs Incurred
CaaS providers host all of the equipment needed to provide their services to their
customers, virtually eliminating the need for customers to maintain data center
space and facilities. Customers receive the benefit of multiple carrier-grade data
centers with full redundancy—and it’s all included in the monthly payment.
5.6 Guaranteed Business Continuity
Distributing risk by using geographically dispersed data centers has become the
norm today. It mitigates risk and allows companies in a location hit by a
8
catastrophic event to recover as soon as possible. With a CaaS solution, multiple
levels of redundancy are built into the system, with no single point of failure.
6.0 Critical technological requirements for a cloud ready storage
Infrastructure
6.1 Load Balancing
With the explosive growth of the Internet the traffic on the Internet is
increasing dramatically, which has been growing at over 100% annually. The
workload on servers is increasing rapidly, so servers may easily be overloaded,
especially servers for a popular web site. There are two basic solutions to the
problem of overloaded servers, One is a single-server solution, i.e., upgrade the
server to a higher performance server. However, the new server may also soon be
overloaded, requiring another upgrade. Further, the upgrading process is complex
and the cost is high. The second solution is a multiple-server solution, i.e., build a
scalable network service system on a cluster of servers. When load increases, one
can simply add one or more new servers to the cluster. Therefore, it is more
scalable and more cost-effective to build a server cluster system for network
services.
With multiple servers, a load balancer a required so that it can distribute
connections among multiple servers, proportionally cutting the work each one has
to do. Load balancing can help with almost any kind of service, including HTTP,
DNS, FTP, POP/IMAP, and SMTP. Load balancing also increases reliability
through redundancy. The balancing service is usually provided by a dedicated
program or hardware device (such as a multilayer switch). Cloud-based server
farms can achieve high scalability and availability using server load balancing.
6.1.1 Load balancing solutions can be divided into two types –
(i) Software-based load balancers – Software-based load balancers
run on standard operating systems and standard hardware
components such as desktop PCs.
(ii) Hardware-based load balancers - Hardware-based load balancers
are specialized boxes that include Application Specific Integrated
Circuits (ASICs) customized for a specific use. ASICs enable high-
speed forwarding of network traffic and are often used for
transport-level load balancing, because hardware-based load
balancers are much faster than software solutions.
9
6.1.2 Examples of Load Balancers
(i) Linux Virtual Server Load Balancer - The Linux Virtual Server
is an opensource advanced load balancing solution that can be used
to build highly scalable and highly available network services such
as HTTP, POP3, SMTP, FTP, media and caching, and Voice over
Internet Protocol (VoIP). There are a few open source load
balancing applications available today, but the Linux Virtual
Server (LVS) continues to be one of the most popular. LVS is a
simple, powerful product used for load balancing and fail-over.
The physical servers and the load balancers may be interconnected
by either a local area network (LAN) or by a geographically
dispersed wide-area network (WAN). The load balancer itself is
the primary entry point of server cluster systems. It can run
Internet Protocol Virtual Server (IPVS), which implements
transport-layer load balancing inside the Linux kernel also known
as Layer-4 switching.
(ii) DNS-Based Load Balancing Clusters - DNS load balancing is
probably the simplest method for building a network service
cluster. The Domain Name System is a hierarchical naming system
for computers, services, or any resource used on the Internet. DNS
translates Internet domain names (which are meaningful to
humans) into the binary identifiers associated with networking
equipment in order to locate and address Internet devices globally.
This process is known as name resolution and is used to distribute
requests to different IP addresses of cluster servers.
(iii) Dispatcher-Based Load Balancing Clusters - A dispatcher
performs intelligent load balancing by using server availability,
capability, workload, and other user-defined criteria to determine
where to send a TCP/IP request. The dispatcher component of a
load balancer can distribute HTTP requests among nodes in a
cluster. The dispatcher distributes the load among servers in a
cluster so the services of nodes appear as a virtual service on a
single IP address; end users interact as if it were a single server,
without knowing anything about the back-end infrastructure.
10
(iv) The Direct Routing Request Dispatching Technique - This
request dispatching approach is similar to the one implemented in
IBM’s NetDispatcher. The virtual IP address is shared by real
servers and the load balancer. The load balancer has an interface
configured with the virtual IP address too, which is used to accept
request packets, and it directly routes the packets to the chosen
servers. All the real servers have their non-arp (address resolution
protocol) alias interface configured with the virtual IP address or
redirect packets destined for the virtual IP address to a local socket,
so that real servers can process the packets locally.
6.2 Virtualization Applications/Appliances - Application virtualization describes
software technologies that improve portability, manageability, and compatibility
of applications by encapsulating them from the underlying operating system on
which they are executed. A virtualized application is redirected at runtime to
interface with the virtual operating system and all related resources that are
managed by it rather than an actual, physical implementation of that operating
system. Full application virtualization requires a virtualization layer. The
virtualization layer must be installed on a machine to intercept file and registry
operations performed by a virtualized application, where it can transparently
redirect those operations to a virtualized destination. The application that
performs file operations never knows that it is not directly accessing a physical
resource. Using this approach, applications can be made portable by redirecting
their I/O tasks to a single physical file, and traditionally incompatible applications
can be executed side by side.
(How a Virtual Machine Works)
6.2.1 Examples of Virtualization solutions / applications
(i) VMware - The VMware virtualization platform is built to
virtualize hardware resources found on an x86-based computer
(e.g., the CPU, RAM, hard disk, and network controller) to create a
11
fully functional virtual machine that can run its own operating
system and applications just like a standard computer. Each virtual
machine is completely encapsulated in order to eliminate any
potential conflicts. VMware virtualization works by inserting a
thin layer of software directly on the computer hardware or on a
host operating system. This layer is actually a monitor called a
Hypervisor, and its task is to allocate hardware resources
dynamically and transparently. Multiple operating systems can run
concurrently on a single computer andshare that computer’s
hardware. A virtual machine is completely compatible with all
standard x86 operating systems, applications, and device drivers. It
is possible to run several operating systems and applications
simultaneously on a single computer, and each operating system
has access to the physical resources it needs on demand.
(ii) Xen - Xen is a unique open source technology. Xen was originally
developed by the Systems Research Group at the University of
Cambridge Computer Laboratory as part of the XenoServers
project. Xen plays a key part by allowing one to efficiently
partition a single machine to enable multiple independent clients to
run their operating systems and applications in an environment.
This environment provides protection, resource isolation, and
accounting. Using Xen server virtualization, the Xen Hypervisor is
installed directly on the host hardware and exists as a thin layer
between the hardware and the operating system. This abstraction
layer allows the host device to run one or more virtual servers. It
isolates hardware from the operating system and its applications.
Xen is licensed under the GNU General Public License (GPL2)
and is available at no charge in both source and object format.
According to the official web site, “Xen is, and always will be,
open sourced, uniting the industry and the Xen ecosystem to speed
the adoption of virtualization in the enterprise.” The Xen
Hypervisor supports a wide range of guest operating systems
including Windows, Linux, Solaris, and various versions of the
BSD operating systems. Virtual device monitors (which are also
known as hypervisors) are often used on mainframes and large
servers seen in data center architectures. Increasingly, they are
being used by Internet service providers (ISPs) to provide virtual
dedicated servers to their customers.
12
7.0 Accessing the cloud in an era of 3G mobile communications Ever since 3G services have been launched by the major operators, the simple voice and
information service can no longer meet the growing requirements of users. The number
of wireless users on 3G services continues to rise daily. The 3G data services have
become the focus of competition among operators. Many operators have introduced
some specialized services. And with the growth of 3G clients and the expansion and
improvement of 3G networks, operators have to provide more diversified 3G services to
survive in the fierce market competition. Cloud can be used as a platform to provide such
value added services.
In this 3G era, mobile TV, mobile securities and data backup will all become critical
businesses. Huge amounts of videos, images, and documents are to be stored in data
centers so that users can download and view them at any time, and they can promote
interaction. Cloud computing can effectively support this kind of business requirements,
and get maximal storage with limited resources. Besides, it can also search and provide
the resources that are needed to users promptly to meet their needs.
The number of commercial UMTS/HSPA networks has risen to 258 in more than 100
countries. It is sure that HSPA and HSPA+ will compete with all prevailing mobile
wireless technologies available today. If the cloud is becoming increasingly pervasive
and mobile browsers are getting better every day, we should ask what more should be
done on the mobile device beyond a browser so that it can access the cloud.
(i) Can browser widgets provide enough functionality that devices don’t need
applications?
(ii) What if customized widgets can get the user everything he needs on the mobile
device to access the cloud?
The potential impact on enterprise mobility is huge. While organizations are deploying
more and more Software-as-a-Service (SaaS) applications, there is no reason mobile
workers can’t access those applications from their mobile devices, assuming they have
enough bandwidth (i.e., 3G- or 4G-capable devices). All that is really required beyond
such bandwidth is a browser that can actually handle all of the various SaaS- associated
web standards. In coming times, device manufacturers will partner with multiple SaaS
vendors to provide enterprises complete cloud-based computing solutions that work
anywhere.
13
8.0 Growing use of smartphones to access the Internet on mobiles –
potential candidates for the cloud The definition of a smartphone is not standardized. For most users, the consensus
is that a smartphone is a mobile device that offers advanced capabilities beyond those
offered by a typical mobile phone. Modern versions come with PC-like functionality.
Many of the newer models have customized operating systems and associated software
that provides a standardized interface. Nearly all smartphones have advanced features
such as email, Internet access, instant messaging, etc. Smartphones are much more than
just another cell phone. They provide instant access to the web. Most smartphones allow
you to sync data with your desktop computer. You can store and work on documents
from your smartphone, and you can receive and reply to emails as they arrive in your
inbox using realtime push email. Smartphone applications may be developed by the
manufacturer of the device or by any other third-party provider or developer capable of
accessing the open source operating system. Other functionalities might include an
additional interface such as a miniature QWERTY keyboard on the touch screen, built-in
video and camera features, contact management, built-in navigation software, office
document processing capability, and software for playing music and viewing video clips.
Such smartphone capabilities transform the common cell phone into a mobile multimedia
platform for your entertainment. They can store and display pictures, videos of friends
and family, or even play live broadcasts of sports or movies. Therefore, smartphones are
excellent candidates for the cloud and considering their numbers on this planet they will
have the largest presence on the cloud.
9.0 Why telecommunication operators should become cloud
providers? Telecommunication operators have lots of reasons for becoming cloud operators. The
reasons are
(i) They own the network
(ii) They own the subscriber (mobiles, fixed lines, enterprise customers,
Internet subscribers etc.)
(iii) They are used to delivering on five-nines, networks are carrier grade
quality
(iv) They can provide end to end QoS to the customer
(v) They have Data Centers which have excess capacity
(vi) Always on the lookout to reduce operation expenditure
(vii) Provide turnkey apps and services ready for consumption by SMBs and
enterprises
(viii) Single unified billing and service experience to the customer
The way telecommunication industry is evolving, the operators hav
newer ways to maximize their revenue streams.
to restructure their businesses to adapt to the new realities of the marketplace. T
businesses of leading service providers
and they may have to face
support unified monitoring
business consolidation of the
necessary resources in time to
market requirements to help
bandwidth makes it easier and quicker to surf Internet
become a critical application of 3G technologies.
among different equipments, software
resources in the cloud through
Single unified billing and service experience to the customer
The way telecommunication industry is evolving, the operators have to keep on finding
newer ways to maximize their revenue streams. Telecommunication operators will have
to restructure their businesses to adapt to the new realities of the marketplace. T
businesses of leading service providers will all cover fixed network and mobile service,
and they may have to face fierce competition in 3G market. Cloud computing can
fied monitoring and dynamic deployment of resources. So, during the
business consolidation of the operators, the cloud computing platform can de
necessary resources in time to support business development, and respond quickly to
market requirements to help operators to gain larger market share. The 3G
bandwidth makes it easier and quicker to surf Internet through mobile phones and
become a critical application of 3G technologies. Cloud computing makes it compatible
g different equipments, software and networks, so that the customers can access the
resources in the cloud through any kinds of clients.
14
Single unified billing and service experience to the customer
e to keep on finding
Telecommunication operators will have
to restructure their businesses to adapt to the new realities of the marketplace. The
rk and mobile service,
erce competition in 3G market. Cloud computing can
and dynamic deployment of resources. So, during the
operators, the cloud computing platform can deploy
support business development, and respond quickly to
The 3G-enabled high
through mobile phones and it has
Cloud computing makes it compatible
and networks, so that the customers can access the
15
10.0 Typical Service offerings on a cloud by Telecommunication
Operators The majority of operators have some form of cloud service currently deployed.
These include variants of managed service offerings that will eventually evolve into
cloud offerings. Operators with an established base of managed services are using them
as a base to “back into” cloud service offerings. Delivering communication-based
services over the cloud is seen as a natural. Some typical service offering possible or
being already offered include -
Sr.No./Type
of service
Proposed
Service
Brief Description of the Service Value Addition to
Customers / SMB
IaaS
1. Virtual Compute Offering virtual machines (Linux,
windows etc.) to customers
No capex
involvement for
hardware and
software
2. Dedicated
Compute
Delivering physical server delivered
as a service
Deliver physical
server as a service
also along with
virtual server
3. Virtual Desktop as
a service
Deliver virtual desktop on demand
to customers
To provide the
complete IT solution
to the customer
4. Storage as a
service
Offering storage on the network as a
service
On-site data storage
not required
PaaS
5. Exchange mail Offering mail over
SMTP/POP3/IMAP
Low cost alternative
to messaging suite
6. Office
communicator
Instant messaging for employees of
an organization
Low cost alternative
to messaging suite
7. Sharepoint Sharepoint as a service Low cost alternative
to messaging suite
8. Database as a
service
Offer dedicated database as a
service
Managed database
as a service
9. Web server as a
service
Offering webserver as a service Managed webserver
as a service
10. Tally Accounting Proven value in
Indian market
11. Antivirus/security Antivirus and security for
corporate/SMB notebooks, PCs etc.
Faster
implementation
12. Sales force
automation
Sales force hosted model on the
cloud
Faster
implementation
13. ERP/CRM Garment, retail and healthcare Faster and easy to
CaaS
14. Self –service IVR
15. PC/Laptop
managed services
16. Video surveillance
17. Video and audio
conferencing
18. PC backup
services
19. Device
management
implement
service IVR Offering hosted IVR facilities to
perform auto attendant/voice mail
features/customer care
Upgradation of
existing EPABX
without capex
managed services
Provide PCs/Laptops to SMBs as a
managed service, including
deployment of CAE, antivirus etc.
Management and
maintenance of
infrastructure as a
part of the
Video surveillance security Remote surveillance
of the business and
office premises
Video and audio Provide audio and video
conferencing facility to their
customers
Book audio / video
conference bridges
PC backup Protect content on PCs Storage solution
Manage devices for mid to large
customers
mFormation
16
implement
Upgradation of
existing EPABX
without capex
Management and
maintenance of
infrastructure as a
part of the service
Remote surveillance
of the business and
office premises
Book audio / video
conference bridges
Storage solution
mFormation
17
11.0 Examples of Cloud Based Services 1.0 Hosting and Data centre Domains
Web Hosting
Website Creator
Insta Compute
i-ID Advantage
2.0 Collaboration Business mail
Premium Mail
Insta Office
Web 2.0 SMS
Sales Watch
3.0 Security and Storage PC Security
Mobile Security
Server Security
Online Backup
e-checkpost
4.0 Communications VoIP
Insta CC
5.0 Business Applications CRM
Recruit
Invoice
MSales
MyEOffice
Live Documents
Draw Easy
Collabrix
12.0 Moving Beyond Flat rate pricing models in a Cloud These types of offerings also come with sophisticated pricing models based on various
types of resources monitoring. This demands robust BSS platforms and all the possible
combinations of charging scenarios based on types, usage, rates, times etc. have to be
supported. E.g. –
(i) Usage based consumption (duration, events etc.)
(ii) Charge back
(iii) SLA violation calculations
(iv) Storage (GB-Month, million I/O requests, etc.)
(v) Bandwidth (public Internet, inbound/outbound, same cloud, regional cloud)
(vi) Computing (CPU Hours, RAM Hours, Service Units, etc.)
(vii) Configurable server instance types
(viii) Billing-on-Behalf-of (BoBo) scenarios
(ix) Allocate Service Level Agreement (SLA)
(x) penalties across the value chain based on fault
18
13.0 Conclusion The market is changing and the Telecommunication operators are also adapting to these changes.
The cloud computing environment provides an ideal platform to provide the host of new services
demanded by customers. All the large operators have massive data centers which are the
backbone to create a cloud and therefore, these operators are well positioned to take advantage of
this technology shift. Internet Data Centers (IDC) have become a strategic initiative for Cloud
service providers to attract users. The demand for cloud based services will be rapidly fuelled by
the public access to the internet through technologies like 3G, 4G, broadband, fibre optic
networks etc. Content will drive these networks and these will reside in data centres mostly
controlled by the telcos. Cloud computing provides an innovative business model for data
centers, and thereby can help telecom operators to promote business innovation and higher
service capabilities against the backdrop of the whole business integration of fixed and mobile
networks. Along with these new services telcos will also have to upgrade their billing systems so
that they can bill their customers end to end for any kind of service. Globally, major telecom
operators are shifting their business model to the cloud and it is time that Indian telecom
operators take this seriously.
14.0 References [i] Borko Furht et. al., Handbook of Cloud Computing, Springer Publications, 2010
[ii] Carrier Cloud Forum, India 2011, Delhi Proceedings, November 15th 2011
[iii] Carrier Cloud Forum, India 2011, Mumbai Proceedings, November 17th 2011
[iv] Richard Chow et.al. Controlling Data in the cloud: outsourcing Computation without
outsourcing control.
[v] Centre for the Protection of National Infrastructure, Information Security Briefing 01/2010
[vi] J.W.Rittinhouse et. al., CRC Press, 2010, Cloud Computing Implementation, Management
and Security
[vii] Jan Gabrielsson et. al., Ericsson Review.1 2010, Cloud Computing in Telecommunications
[viii] EC Expert Group Report, The Future of Cloud Computing: Opportunities for European cloud
Computing Beyond 2010