0% found this document useful (0 votes)
0 views

Lecture 8

Uploaded by

safarinyakundi21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Lecture 8

Uploaded by

safarinyakundi21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

CHAPTER

14
Network-as-a-Service
Overview

N etwork as a Service allows us to access to network infrastructure directly and securely. NaaS makes it

possible to deploy custom routing protocols.


NaaS uses virtualized network infrastructure to provide network services to the consumer. It is the responsibility
of NaaS provider to maintain and manage the network resources which decreases the workload from the consumer.
Moreover, NaaS offers network as a utility.
NaaS is also based on pay-per-use model.

How NaaS is delivered?


To use NaaS model, the consumer is required to logon to the web portal, where he can get online API. Here, the
consumer can customize the route.

In turn, consumer has to pay for the capacity used. It is also possible to turn off the capacity at any time.

Mobile NaaS
Mobile NaaS offers more efficient and flexible control over mobile devices. It uses virtualization to simplify the
architecture to create more efficient processes.

Following diagram shows the Mobile NaaS service elements:

TUTORIALS POINT
Simply Easy Learning
NaaS Benefits
NaaS offers a number of benefits, some of them are discussed below:

TUTORIALS POINT
Simply Easy Learning
INDEPENDENCE
Each consumer is independent and can segregate the network.

BURSTING
Customers have to pay for high-capacity network only when needed.

RESILIENCE
There exists reliability treatments that can be applied for critical applications.

ANALYTICS
There exists data protection solution for highly sensitive applications.

EASE OF ADDING NEW SERVICE ELEMENTS


It is very easy to integrate new service elements to the network.

TUTORIALS POINT
Simply Easy Learning
SUPPORT MODELS
There exists more open support models, which help to reduce the operation cost.

ISOLATION OF CUSTOMER TRAFFIC


The customer traffic is logically isolated.

TUTORIALS POINT
Simply Easy Learning
CHAPTER

15
Cloud Computing Management
Overview

I t is the responsibility of cloud provider to manage resources and their performance. Management may include

several aspects of cloud computing such as load balancing, performance, storage and backups, capacity,
deployment , etc. Management is required to access full functionality of resources in the cloud.

Cloud Management Tasks


Cloud Management involves a number of tasks to be performed by the cloud provider to ensure efficient use of
cloud resources. Here, we will discuss some of these tasks:

TUTORIALS POINT
Simply Easy Learning
AUDIT SYSTEM BACKUPS
It is required to timely audit the backups to ensure you can successfully restore randomly selected files of different
users. Backups can be performed in following ways:

 Backing up files by the company, from on-site computers to the disks that reside within the cloud.

 Backing up files by the cloud provider.

It is necessary to know if cloud provider has encrypted the data, who has access to that data and if the backup is
taken at different locations, you must know where.

SYSTEM'S DATA FLOW


The managers should develop a diagram describing a detailed process flow. This process flow will describe the
movement of company's data throughout the cloud solution.

BEWARE OF VENDOR LOCK-IN


The managers must know the procedure to exit from services of a particular cloud provider. There must exist
procedures, enabling the managers to export company's data to a file and importing it to another provider.

KNOWING PROVIDER'S SECURITY PROCEDURES


The managers should know the security plans of the provider for different services:

 Multitenant use

 E-commerce processing

 Employee screening

 Encryption policy

MONITOR CAPACITY PLANNING AND SCALING CAPABILITIES


The managers should know the capacity planning in order to ensure whether the cloud provider will meet the future
capacity requirement for his business or not.

It is also required to manage scaling capabilities in order to ensure services can be scaled up or down as per the
user need.

MONITOR AUDIT-LOG USE


In order to identify the errors in the system, managers must audit the logs on a regular basis.

SOLUTION TESTING AND VALIDATION


It is necessary to test the solutions provided by the provider in order to validate that it gives the correct result and is
error-free. This is necessary for a system to be robust and reliable.

TUTORIALS POINT
Simply Easy Learning
CHAPTER

16
Cloud Computing Data Storage

C loud Storage is a service that allows to save data on offsite storage system managed by third-party and is

made accessible by a web services API.

Storage Devices
Storage devices can be broadly classified into two categories:

 Block Storage Devices

 File Storage Devices

BLOCK STORAGE DEVICES


Block Storage Devices offer raw storage to the clients. This raw storage can be partitioned to create volumes.

FILE STORAGE DEVICES


File Storage Devices offers storage to clients in form of files, maintaining its own file system. This storage is in the
form of Network Attached Storage (NAS).

Cloud Storage Classes


Cloud Storage can be broadly classified into two categories:

 Unmanaged Cloud Storage

 Managed Cloud Storage

UNMANAGED CLOUD STORAGE


Unmanaged Cloud Storage means that the storage is preconfigured for the consumer. The
consumer cannot format nor the consumer can install own file system or change drive properties.

TUTORIALS POINT
Simply Easy Learning
MANAGED CLOUD STORAGE
Managed Cloud Storage offers online storage space on demand. Managed cloud storage system presents what
appears to the user to be a raw disk that the user can partition and format.

Creating Cloud Storage System


The cloud storage system stores multiple copies of data on multiple servers and in multiple locations. If one system
fails, then it only requires to change the pointer to stored object's location.

To aggregate storage assets into cloud storage systems, the cloud provider can use storage virtualization
software, StorageGRID. It creates a virtualization layer that fetches storage from different storage devices into a
single management system. It can also manage data from CIFS and NFS file system over the Internet. The
following diagram shows how SystemGRID virtualizes the storage into storage clouds:

Virtual Storage Containers


Virtual storage containers offer high performance cloud storage systems. Logical Unit Number (LNU)of device,
files and other objects are created in virtual storage containers. Following diagram shows a virtual storage
container, defining a cloud storage domain:

TUTORIALS POINT
Simply Easy Learning
Challenges
Storing the data in cloud is not that simple task. Apart from its flexibility and convenience, it also has several
challenges faced by the consumers. The consumers require ability to:

 Provision additional storage on demand.

 Know and restrict the physical location of the stored data.

 Verify how data was erased?

 Have access to a documented process for surely disposing of data storage hardware.

 Administrator access control over data.

TUTORIALS POINT
Simply Easy Learning
CHAPTER

17
Cloud Computing Virtualization
Virtualization

V irtualization is a technique, which allows to share single physical instance of an application or resource

among multiple organizations or tenants (customers). It does so by assigning a logical nameto a physical resource
and providing a pointer to that physical resource when demanded.

Virtualization Concept
Creating a virtual machine over existing operating system and hardware is referred as Hardware Virtualization.
Virtual Machines provide an environment that is logically separated from the underlying hardware.

The machine on which the virtual machine is created is known as host machine and virtual machineis referred as
a guest machine. This virtual machine is managed by a software or firmware, which is known as hypervisor.

HYPERVISOR
Hypervisor is a firmware or low-level program that acts as a Virtual Machine Manager. There are two types of
hypervisor:
Type 1 hypervisor runs on bare system. LynxSecure, RTS Hypervisor, Oracle VM, Sun xVM Server,
VirtualLogic VLX are examples of Type 1 hypervisor. The following diagram shows the Type 1 hypervisor.

TUTORIALS POINT
Simply Easy Learning

You might also like