Cloud Computing Concept, Technology & Architecture



Similar documents
Cloud Computing Architecture

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Fundamental Concepts and Models

Cloud Storage Specialist Certification Self-Study Kit Bundle

Fundamental Concepts and Models

Cloud Security Specialist Certification Self-Study Kit Bundle

Open Source Cloud Computing Management with OpenNebula

Performance Management for Cloudbased STC 2012

Cloud Virtualization Specialist Certification Self-Study Kit Bundle

Cloud Certified Professional (CCP)

Lecture 02a Cloud Computing I

Remote Voting Conference

SOA C90-02A. Cloud Technology Concepts. Practice Test. Version: QQ:

APPLICATION NOTE. Elastic Scalability. for HetNet Deployment, Management & Optimization

Delivering secure, real-time business insights for the Industrial world

How To Build A Software Defined Data Center

Performance Management for Cloud-based Applications STC 2012

CHAPTER 8 CLOUD COMPUTING

Optimizing Service Levels in Public Cloud Deployments

HP OO 10.X - SiteScope Monitoring Templates

Assignment # 1 (Cloud Computing Security)

Microsoft s Advantages and Goals for Hyper-V for Server 2016

Cloud Computing. Adam Barker

Improving OpenStack* Hybrid Cloud Security

Radware Cloud Solutions for Enterprises. How to Capitalize on Cloud-based Services in an Enterprise Environment - White Paper

How To Manage A Virtualization Server

Cloud Architect Certification Self-Study Kit Bundle

Developing Microsoft Azure Solutions 20532B; 5 Days, Instructor-led

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

HP Insight Management Agents architecture for Windows servers

Veeam ONE What s New in v9?

Introduction to OpenStack

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments

WHITE PAPER OCTOBER CA Unified Infrastructure Management: Solution Architecture

ReadyNAS Replicate. User Manual. July East Plumeria Drive San Jose, CA USA

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

NCTA Cloud Architecture

Getting Started with Sitecore Azure

Managed Cloud Services

Trademark Notice. General Disclaimer

CA Server Automation. Overview. Benefits. agility made possible

Alfresco Enterprise on Azure: Reference Architecture. September 2014

G DATA TechPaper #0275. G DATA Network Monitoring

Symantec Virtual Machine Management 7.1 User Guide

SierraVMI Sizing Guide

OpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar

The Service, The Cloud & The Method: The Connection Points

Google Cloud Platform The basics

Kubernetes-Murano Integration in Mirantis OpenStack 7.0

Web Application Hosting Cloud Architecture

WhiteWave's Integrated Managed File Transfer (MFT)

Building Clouds with OpenNebula 3.4

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33

CLOUD SERVICES FOR EMS

The look and feel of a traditional Dedicated Server, with the on-demand scalability, flexibility and reliability you expect from the Cloud.

Introduction to Cloud Computing

Desktop Central Managing Windows Computers in WAN

This presentation provides an overview of the architecture of the IBM Workload Deployer product.

A Technical Overview of VMT s Architecture: Virtual Infrastructure Management. Key Architecture Components

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

SAP HANA Cloud Platform, Portal Service: Overview SAP Cloud Experience and SAP Portal Product Management May 2016

Monitoring Agent for Citrix Virtual Desktop Infrastructure Version Reference IBM

IBM EXAM QUESTIONS & ANSWERS

OpenNebula Open Souce Solution for DC Virtualization

PARALLELS CLOUD STORAGE

Cloud-Based dwaf A Real World Deployment Case Study. OWASP 5. April The OWASP Foundation

Blog:

SOA REFERENCE ARCHITECTURE: SERVICE ORIENTED ARCHITECTURE

my forecasted needs. The constraint of asymmetrical processing was offset two ways. The first was by configuring the SAN and all hosts to utilize

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Manjrasoft Market Oriented Cloud Computing Platform

Cloud Computing Utility and Applications

OpenNebula Open Souce Solution for DC Virtualization

Using the VMRC Plug-In: Startup, Invoking Methods, and Shutdown on page 4

CLOUD COMPUTING An Overview

OpenNebula The Open Source Solution for Data Center Virtualization

Active Directory Services with Windows Server

SSL Inspection Step-by-Step Guide. June 6, 2016

Security Issues in Cloud Computing

Mobile Cloud Networking FP7 European Project: Radio Access Network as a Service

Oracle Cloud Bjarte Drivenes Enterprise Architect. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Building Cloud-Connected Solutions with Exosite and Texas Instruments

BMC Service Assurance. Proactive Availability and Performance Management Capacity Optimization

Getting Started Hacking on OpenNebula

How To Protect Your Cloud From Attack

Designing a Microsoft Exchange Server 2003 Organization

Cloud Courses Description

WINDOWS AZURE NETWORKING

ilinc Web Conferencing

An Introduction to Cloud Computing Concepts

WHY SERVICE PROVIDERS NEED A CARRIER PaaS SOLUTION cpaas for Network

Transcription:

Cloud Computing Concept, Technology & Architecture Chapter 07 Cloud Computing Mechanisms 課 程 名 稱 : 雲 端 管 理 系 統 授 課 教 師 : 高 勝 助

Contents Technology mechanisms foundational to cloud platforms are covered, including: 7.1 Logical Network Perimeter 7.2 Virtual Server 7.3 Cloud Storage Device 7.4 Cloud Usage Monitor 7.5 Resource Replication 7.6 Ready-Made Environment 2

7.1 Logical Network Perimeter The isolation of a network environment from the rest of communications network, the logical network perimeter establishes a virtual network boundary that can encompass and isolate a group of related cloud-based IT resources that may be physically distributed. Logical network perimeter can be implement to isolate IT resources in a cloud from cloud users and control the bandwidth via network devices by deploying virtual firewall and virtual network. 3

Figure 7.2 4 Figure 7.2 Virtual firewall (top) and virtual network. (bottom)

Figure 7.3 5 Figure 7.3 Two logical network perimeters surround the cloud consumer and cloud provider environments.

Figure 7.4 - A logical network layout is established through a set of logical network perimeters using various firewalls and virtual networks. 6

7.2 Virtual Server A virtual server is a form of virtualization software that emulates a physical service. 7 The virtual server represents the mode fundamental building block of cloud environment. The instantiation of virtual servers from image files is a resource allocation process that can be completed rapidly and on-demand. Cloud customers that install or lease virtual servers can customize their environments independently from other customers.

Figure 7.5 8 Figure 7.5 - The first physical server hosts two virtual servers, while the second physical server hosts one virtual server.

Figure 7.6 9 Figure 7.6 - A virtual server hosts an active cloud service and is further accessed by a cloud consumer for administrative purposes.

Figure 7.7 10 Figure 7.7 - Virtual servers are created via the hypervisor and VIM.

7.3 Cloud Storage Device (1/3) The cloud storage device mechanism represents storage devices that are designed specifically for cloud-based provisioning. Cloud storage devices are commonly able to provide fixed-increment capacity allocation in support of the pay-per-use mechanism. The primary concern related to cloud storage is the security, integrity, and confidentiality. 11

7.3 Cloud Storage Device (2/3) There are several levels in providing common logical units of data storage: files located in a folder 12 Blocks lowest level of storage closest to the HW Datasets table-based, delimited, or record collection Objects web-based resources

7.3 Cloud Storage Device (3/3) According to different storage levels, there are three kinds of interfaces implemented: Network storage interfaces files or blocks Object storage interfaces web resources 13 Databasre storage interfaces relational or nonrelational (NoSQL)

Figure 7.9 14 Figure 7.9 - Different cloud service consumers utilize different technologies to interface with virtualized cloud storage devices. (Adapted from the CDMI Cloud Storage Reference Model.)

Figure 7.10 (1/3) 15 The cloud service consumer interacts with management tools to create the cloud storage device and define appropriated access control policies for each data object (1).

Figure 7.10 (2/3) 16 The management tools interact with the cloud storage software to create a cloud storage device instance and apply the required access policy to its data objects (2).

Figure 7.10 (3/3) 17 Each data object is assigned to a cloud storage device and all of the data objects are stored in the same virtual storage volume. The cloud service consumer uses the cloud storage device interface to access data objects (3).

Figure 7.11 (1/3) 18 The cloud service consumer uses management tools to create and assign a cloud storage device to an existing virtual server (1).

Figure 7.11 (2/3) 19 The management tools interact with the VIM software (2a), which creates and configures the appropriate LUN (2b).

Figure 7.11 (3/3) 20 Each cloud storage device uses a separate LUN controlled by the virtualization platform. The cloud service consumer uses the virtual server (3a) to access the cloud storage device (3b).

7.4 Cloud Usage Monitor (1/2) The cloud usage monitor mechanism is a lightweight and autonomous software program responsible for collecting and processing IT resource usage. Three common agent-based implementation formats: monitoring agent Resource agent Polling agent 21

7.4 Cloud Usage Monitor (2/2) 22 Each monitor agent can be designed to forward collected usage data to a log database for postprocessing and reporting purposes. monitoring agent is usually an event-driven program to network traffic and message metrics. resource agent monitors usage metrics based on pre-defined, observable events at the resource software level, such as initiating, suspending, resuming, and vertical scaling. polling agent polls IT resources to periodically monitor IT resource status, eg. up or down time.

Figure 7.12 (1/2) 23 A cloud service consumer send a request message to a cloud service (1). The monitoring agent intercepts the message to collect relevant usage data (2) before allowing it to continue to the cloud service (3a).

Figure 7.12 (2/2) 24 The monitoring agent stores the collected usage data in a log database (3b). The cloud service replies with a response message (4) that is sent back to the cloud service consumer without being intercepted by the monitoring agent (5).

Figure 7.13 25 The resource agent is actively monitoring a virtual server and detects an increase in usage (1). The resource agent receives a notification from the underlying resource management program that the virtual server is being scaled up and stores the collected usage data in a log database, as per its monitoring metrics (2).

Figure 7.14 26 Figure 7.14 - A polling agent monitors the status of a cloud service hosted by a virtual server by sending periodic polling request messages and receiving polling response messages that report usage status "A" after a number of polling cycles, until it receives a usage status of "B" (1), upon which the polling agent records the new usage status in the log database (2).

Figure 7.15 (1/3) The cloud service consumer (CS_ID = CS1) requests the creation of a virtual server (VM_ID = VM1) of configuration size type 1 (VM_TYPE = type1) (1). The VIM creates the virtual server (2a). The VIM's event-driven API generates a resource usage event with timestamp = t1, which the usage monitor software agent captures and records in the resource usage event log database (2b). 27

Figure 7.15 (2/3) Virtual server usage increases and reaches the auto-scaling threshold (3). The VIM scales up Virtual Server (VM1) (4a) from configuration type 1 to type 2 (VM_TYPE = type2). The VIM's event-driven API generates a resource usage event with timestamp = t2, which is captured and recorded at the resource usage event log database by the usage monitor software agent (4b). 28

Figure 7.15 (3/3) The cloud service consumer shuts down the virtual server (5). The VIM stops Virtual Server (VM1) (6a) and its event-driven API generates a resource usage event with timestamp = t3, which the usage monitor software agent captures and records at the log database (6b). Management tools access the log database and calculate the total usage for Virtual Server Utotal (VM1) (7). 29

7.5 Resource Replication 30 Replication is usually performed when resource s availability and performance need to be enhanced. Resource replication mechanism usually uses virtualization technology to replicate cloud-based IT resources.

Figure 7.16 31 Figure 7.16 - The hypervisor replicates several instances of a virtual server.

Figure 7.17 Figure 7.17 - A high availability virtual server is running in Data Center A. VIM instances, in Data Center A and Data Center B, are executing the coordination function that allows detection of failure conditions. Storage of VM images is replicated between data centers, as a consequence of the high availability configuration. 32

Figure 7.18 33 Figure 7.18 - The virtual server becomes unavailable in Data Center A. VIM in Data Center B detects the failure condition and starts to reallocate the high availability server from Data Center A into Data Center B.

Figure 7.19 34 Figure 7.19 - A new instance of the virtual server is created in Data Center B and the service becomes available.

7.6 Ready-Made Environment 35 The ready-made environment mechanism is a defining component of the PaaS cloud delivery model that represents a platform comprised of a set of already installed IT resources, ready to be used and customized by a cloud consumer. Ready-made environments are utilized by cloud consumers to remotely develop and deploy their own services and applications within a cloud by providing with a complete software development kit (SDK). Typical ready-made environments include preinstalled IT resources, eg. database, middleware, governance tools.

Figure 7.20 36 Figure 7.20 - A cloud consumer accesses a ready-made environment hosted on a virtual server.

Figure 7.21 (1/3) 37 The cloud developer uses the provided SDK to develop the Web application (1). The application software is deployed on the Web platform that was established by the two readymade environments called the frontend instance (2a) and the backend instance (2b).

Figure 7.21 (2/3) 38 The application is made available for end-users and one accesses the application interface at the frontend instance (3). The software running in the frontend instance invokes a long-running task at the backend instance that corresponds to the processing required by the enduser (4).

Figure 7.21 (3/3) 39 The application software deployed at both the frontend and backend instances is backed by a cloud storage device that implements persistent storage of the application data (5).