CC Unit 4
CC Unit 4
CLOUD COMPUTING
UNIT IV
CLOUD COMPUTING CS19741
Department
of CSE
UNIT IV
CLOUD COMPONENTS MECHANISM
Cloud Infrastructure Mechanism:
Resource Replication
Cloud Storage
Cloud storage is a cloud computing model that enables storing data and files on the internet
through a cloud computing provider that you access either through the public internet or a
dedicated private network connection.
The provider securely stores, manages, and maintains the storage servers, infrastructure,
and network to ensure you have access to the data when you need it at virtually unlimited
scale, and with elastic capacity.
Cloud storage removes the need to buy and manage your own data storage infrastructure,
giving you agility, scalability, and durability, with any time, anywhere data access.
Cloud Usage Monitor
A cloud usage monitor is a tool that tracks and analyzes the usage of cloud resources to
optimize their utilization and minimize costs. It provides visibility into resource usage
patterns such as CPU usage, memory usage, network traffic, and storage usage. It enables
businesses to identify underutilized resources and make the necessary adjustments to
optimize performance and reduce expenses.
Resource Replication
Resource replication in cloud computing refers to the process of duplicating data,
applications, or services across multiple servers or data centers within a cloud infrastructure.
This redundancy ensures high availability, fault tolerance, and reliability of services offered
by cloud providers.
1. Data Distribution: When data is stored in the cloud, it's often replicated across multiple
servers or data centers. This distribution ensures that if one server fails, the data can still be
accessed from another location without interruption.
2. Automatic Replication: Cloud platforms often have built-in mechanisms for automatic
replication. When a file or piece of data is uploaded to the cloud, it's automatically replicated
to multiple locations according to predefined replication policies set by the cloud provider or
user.
3. Load Balancing: Resource replication also involves load balancing mechanisms to evenly
distribute workloads across replicated resources. This ensures optimal performance and
prevents any single server from becoming overwhelmed with requests.
4. Synchronization: To ensure consistency across replicated resources, synchronization
mechanisms are employed. Changes made to data or applications in one location are
synchronized with all other replicated instances in real-time or at defined intervals.
5. Failover and Disaster Recovery: Replication plays a crucial role in failover and
disaster recovery scenarios. If one server or data center experiences a failure, traffic can be
rerouted to replicated resources, minimizing downtime and ensuring continuity of service.
The purpose of an SLA in networking is to define the specific terms, conditions, and
performance expectations related to the delivery of network services.
2.Customer-Based SLA: The second type of SLA is customer-based SLA, an agreement that
covers all the services used by this customer. E.g., an IT service provider provides different
services like networking, maintenance, installations, monitoring, and more to the customers
and businesses, and all are documented in one service level agreement, then it is called
customer-based SLA.
3.Multi-Level SLA: The Multi-level SLA is again divided into three levels, each defining a
different set of customers for the same services and different services for the specific set of
customers. Maintaining SLA’s part of service level management (SLM)
Customer Level: It covers all the service level management (SLM) problems
relevant to the particular customer groups, irrespective of their services.
Service Level: It covers all the service level management (SLM) problems
relevant to a specific set of services in relation to a specific customer group.
Corporate Level: It covers all the service level management (SLM) problems
apt to every customer in an organization.
Pay-Per-use Monitor
The pay-per-use monitor mechanism measures cloud-based IT resource usage in
accordance with predefined pricing parameters and generates usage logs for fee
• bandwidth consumption
resources in support of, or dictated by, regulatory and contractual obligations. The figure
requests and stores the requestor’s security credentials, as well as both failed and successful
failover mechanisms typically involve the use of redundant resources, such as servers,
storage, or network connections, which are constantly monitored for failures or
performance degradation.
Resource Allocation: The broker can help in managing the distribution of resources
(like cloud storage or processing power) among multiple devices, optimizing
performance and ensuring that resources are used efficiently.
Authentication and Security: It ensures that access controls and security measures
are consistently applied across all devices. This includes managing user
authentication, authorization, and encryption to protect data and user privacy.
State Management Database
state management databases are systems designed to manage and persist the state
of applications or services. They are essential for tracking and storing the dynamic
data that applications use and generate during their operation. This includes user
sessions, application states, transaction histories, and other data that need to be
preserved across different interactions and instances.