Advantages of IaaS | disadvantages of IaaS
This page covers advantages and disadvantages of IaaS (Infrastructure as a Service) and its basics. It mentions benefits or advantages of IaaS and drawbacks or disadvantages of IaaS.
What is IaaS?
It allows businesses or individual users to run any applications on cloud supplier's hardware. It helps in migration of applications to the suppliers hardware. It allows suppliers to share their physical servers to the users.
IaaS types include private cloud, dedicated hosting, hybrid hosting and cloud hosting. The figure-1 mentions all the tasks performed by IaaS.
IaaS provides access to fundamental resources such as physical machines, virtual machines, virtual storage etc.
Apart from these resources, IaaS offers following.
• Virtual machine disk storage
• Virtual Local Area Network (VLANs)
• Load Balancers
• IP Addresses
• Software bundles
All the above resources are made available to end users via server virtualization. Users or customers can use above resources as if they own them.
Examples of IaaS vendors:
Amazon Web services
Benefits or advantages of IaaS
Following are the benefits or advantages of IaaS:
➨It allows full control of computing resources through administrative access to VMs (Virtual Machines).
Hence customers can run anything, choose to automate provisioning or build their own VM.
➨It offers flexible and efficient renting of computer hardware.
➨It offers portability and interoperability with legacy applications.
➨It simplifies integration with enterprise infrastructure.
➨The customers do not have to worry about cost and maintenance while running its own virtual infrastruture (instead of its own hardware).
Drawbacks or disadvantages of IaaS
Following are the drawbacks or disadvantages of IaaS:
➨It is most expensive service as customer is leasing a tangible resource. The provider can charge for every cycle, bit of RAM or disk space used.
➨Customers are responsible for backups and all other aspects of VM management.
➨Customers or users do not have any control over server used or its geographical location.
➨Compatibility with legacy security vulnerabilities
➨Virtual machine sprawl
➨Data erase practices
➨Robustness of VM level isolation