Week 8 - Reading Material
Week 8 - Reading Material
1
TABLE OF CONTENTS
INTRODUCTION .....................................................................................................................................................3
GLOSSARY ............................................................................................................................................................ 20
REFERENCES ........................................................................................................................................................ 21
2
INTRODUCTION
This chapter presents the diverse and advanced architectural layers of cloud technology architecture,
many of which can be constructed upon the more basic settings produced by the architectural models
explored in the preceding chapter. The chapter also investigates into specialized solution architectures
including cloud balancing and cloud provisioning, as well as elastic, resilient, multitenant, and
containerized technology architectures. Cloud Federation and Brokerage explain the IT role and
business model, as well as the practice of linking cloud computing environments to load balance traffic
3
LEARNING OBJECTIVES
At the end of this week, students will be able to:
1. Describe the advanced cloud architectural mechanisms, industry technologies and design
2. Classify and organizes content so that architectural layers are explored sequentially and,
3. Understand the cloud federation and brokerage that explain geographic footprints and
describe custom solutions that enable to better manage, track billing and payments.
frequency.
4
ADVANCED CLOUD ARCHITECTURES
In this section, we'll look at cloud architecture ideas that speak to specific and sophisticated
engineering layers. Every organization, from small too big, medium to giant, employs cloud
computing services to store information and access it from anywhere and at any time using only
dependency, any failures that affect a hypervisor can have a cascading effect on its virtual servers.
The hypervisor clustering architecture creates a high-availability hypervisor cluster that spans
many physical servers. To sustain runtime operations, the hosted virtual servers can be relocated
to another physical server or hypervisor if a specific hypervisor or its underlying physical server
5
The hypervisor cluster is managed by a central Virtualized Infrastructure Manager (VIM), which
sends regular heartbeat messages to the hypervisors to ensure they are operational.
Unacknowledged heartbeat messages force the VIM to launch the live VM migration program,
between physical servers whose operation and management are isolated. A physical server can
easily host more virtual servers or receive greater workloads than its neighbors. Over- and under-
utilization of physical servers can both increase rapidly over time, resulting in continual
performance issues (for over-utilized servers) and constant waste (for the lost processing potential
The load balanced virtual server instances design creates a capacity watchdog system that
calculates virtual server instances and associated workloads dynamically before distributing them
across available physical server hosts. A capacity watchdog cloud usage monitor, live Virtual
Machine (VM) migration software, and a capacity planner make up the capacity watchdog system.
The capacity watchdog monitor keeps track of physical and virtual server usage and alerts the
capacity planner if there are any noteworthy changes. The capacity planner is in charge of
dynamically matching physical server compute capacities to virtual server capacity requirements.
The live VM migration application is triggered to relocate the virtual server if the capacity planner
decides to move it to another host to divide the burden (Buyya et al., 2013).
6
FIGURE 8.2 Loads Balanced Virtual Server Instances Architecture (Buyya et al., 2013)
1. Runtime use demands that exceed the processing capability of the cloud service.
When a cloud service goes unavailable, consumer requests are typically refused, which can result
in exception conditions.
event initiates the duplication or movement of a cloud service implementation at runtime, avoiding
any downtime. Cloud service activity can be temporarily shifted to another hosting environment
at runtime by installing a duplicate implementation onto a new host, rather than scaling cloud
7
services in or out with redundant implementations.
When the original implementation is down for maintenance, cloud service consumer queries might
physical server hosts, the cloud service implementation and any cloud service activity can be
accepting and responding to cloud service consumer requests before the original cloud service
FIGURE 8.3 (a) Before Failure (b) After Failure (Buyya et al., 2013)
The use of live VM migration to relocate the complete virtual server instance that hosts the cloud
service is a typical strategy. In response to scaling and workload distribution requirements, the
automated scaling listener and/or load balancer techniques can be utilized to trigger a temporary
8
redirection of cloud service consumer requests. To start the live VM migration process, either
mechanism can contact the VIM. Depending on the location of the virtual server's disks and
• If the virtual server disks are stored on a local storage device or non-shared remote storage
devices associated to the source host, a copy of the virtual server disks is made on the
destination host. Both virtual server instances are synced when the copy is produced, and
• If the virtual server's data are stored on a remote storage device shared by the origin and
destination hosts, copying the virtual server disks is unnecessary. The virtual server's
ownership is simply moved from the origin to the destination physical server host, and the
if the real server fails or is attacked, any (or all) hosted virtual servers may suffer. This makes it
a sophisticated failover system that allows virtual servers to be dynamically transferred to new
across different clouds. Consumer requests for cloud services can be balanced between clouds,
Its primary functionality is based on a combination of automated scaling and failover system
techniques. A complete architecture can have many more components and mechanisms. The two
• Based on current scaling and performance needs, the automated scaling listener routes
• In the case of a failure within an IT resource or its underlying hosting environment, the
failover system ensures that redundant IT resources are capable of cross-cloud failover. IT
resource failures are reported so that the automated scaling listener can avoid routing cloud
2013).
The automated scaling listener must be aware of all redundant IT resource implementations within
10
the scope of the cloud balanced architecture for a cloud balancing architecture to function
synchronization.
2. A component of a resource
11
3. A variety of resources
The resource management system mechanism, which is used to establish the consumption
thresholds for individual resources and resource pools, may be required for the creation of a
resource reservation system. Reservations secure the amount of resources that each pool requires,
leaving the rest of the pool's resources open for sharing and borrowing. The remote administration
system approach is also utilized to offer front-end customization, allowing cloud customers to
manage their reserved resource allocations through administrative controls (Rosenberg, J. 2010,
FIGURE 8.6 Resource Reservation Architecture (Rosenberg, J. 2010, Buyya et al., 2013)
Cloud storage devices and virtual servers are two sorts of techniques that are frequently reserved
inside this architecture. Other mechanisms that could be included in the architecture are:
12
• Audit Monitor
• Hypervisor
• Resource Replication
failure scenarios. This system alerts and escalates failure scenarios that it cannot resolve
autonomously. It uses the intelligent watchdog monitor, a customized cloud usage monitor, to
actively track resources and conduct pre-defined actions in response to pre-defined events. The
1. Watching
4. Reporting
5. Escalating
For each resource, sequential recovery policies can be established to determine the actions that the
intelligent watchdog monitor should perform in the event of a failure state. A recovery policy
might indicate, for example, that one recovery attempt must be made automatically before
13
FIGURE 8.7 Dynamic Failure Detection and Recovery Architecture (Buyya et al., 2013)
agents that can identify and provision whole operating systems remotely. When the server boots
up, the remote administration software that is built into the ROM becomes available. To connect
to the physical server's native remote management interface, a Web-based or proprietary user
interface, such as the portal supplied by the remote administration system, is commonly utilized.
IP addresses in IaaS platforms can be passed directly to cloud users, allowing them to deploy bare-
to connect to the deployment software and provide several servers or operating systems at the same
time. The central deployment system connects to the servers via their management interfaces, and
uploads and runs as an agent in the physical server's RAM using the same protocol. The raw client
becomes a bare-metal server with a management agent installed, and the deployment software
uploads the appropriate setup files to deploy the operating system (Erl. T, 2013).
resources, either individually or collectively. The underlying technical architecture for quick
resource provisioning is complicated and complex and it relies on a system that includes an
automated provisioning program, a rapid provisioning engine, and on-demand provisioning scripts
15
FIGURE 8.9 Rapid Provisioning Architecture (Erl. T, 2013)
1. A cloud resource administrator uses the self-service portal to request a new cloud service.
2. The self-service portal sends the request to the virtual server's automatic service
provisioning application.
4. When the new cloud service is ready, the quick provisioning engine notifies you.
5. The automated service provisioning program completes and publishes the cloud service for
storage devices, while a storage capacity system ensures that runtime workloads are distributed
16
FIGURE 8.10 Storage Workload Management Architecture (Hwang, K., 2013)
LUN data is evenly dispersed throughout available storage hosts when cloud storage devices are
combined into a group. To monitor and equalize runtime workloads among the grouped cloud
storage devices, a storage management system is configured and an autonomous scaling listener is
networks that may be accessed via the internet by a client. Cloud services brokerage (CSB) is an
IT position and business model in which a corporation or other organization provides value to one
or more (public or private) cloud services on behalf of one or more customers by performing three
main functions: aggregation, integration, and customization brokerage (Comer, D.E., 2021).
CLOUD FEDERATION
• Virtual Machines (VMs) - This is the interconnection of two or more Cloud computing
17
infrastructures for load balancing.
• One of the service providers purchases the services from the other.
• It generates cash for the seller while allowing the buyer to expand their resource capacity
• Federation can be done horizontally or vertically by extending the federation buyer's SaaS,
• The SLA of the buyer's customers is also followed over the seller's infrastructure (Comer,
D.E., 2021).
• If the scenario continues, the cloud provider may face SLA fines.
• The cloud provider must decide whether to handle client requests that exceed current
o To reduce network latency, a cloud federation can be built to fulfill the requests of
o Horizontal federation is possible. The cloud services (IaaS, PaaS, and SaaS) are
instance of another provider B on its own IaaS to meet provider A's needs.
CLOUD BROKERAGE
• It's a third-party procedure for locating the best cloud provider, and it's based on the
• Saves the customer time and effort in looking for a Cloud provider.
• After that, the broker looks for the finest cloud provider options for the client.
• Based on the consumer's needs and budget, a list of suppliers is subsequently offered.
19
• The broker may also be given the authority to negotiate with providers on the consumer's
behalf. Even better, the broker can negotiate a contract with the best provider.
o Application Programming Interface (API) and Graphical User Interface (GUI) for
o A consumer advisory service to help them get the most out of the cloud (Comer,
D.E., 2021).
GLOSSARY
Intelligent Automation Engine: By executing scripts that incorporate process logic, the
LUN: A logical unit number (LUN) is a logical drive that corresponds to a physical disk partition.
Storage Service Gateway: The storage service gateway is an external interface to cloud storage
services that can automatically redirect cloud consumer requests when the location of the requested
data changes.
Storage Replication: Storage replication is a type of resource replication that replicates data from
Heartbeats: Hypervisors, hypervisors and virtual servers, and hypervisors and VIMs all exchange
Live VM migration: A system capable of transferring virtual servers or virtual server instances
20
in real time is known as live VM migration.
LUN migration: LUN migration is a specialized storage tool that allows you to relocate LUNs
from one storage device to another without causing any disruption to cloud users.
REFERENCES
1. Buyya, R. et al., (2013). Mastering cloud computing: foundations and applications
programming. Newnes.
2. Comer, D.E., (2021). The Cloud Computing Book: The Future of Computing Explained.
3. Erl, T. et al., (2013). Cloud computing: concepts, technology, & architecture. Pearson
Education.
4. Hwang, K. et al., (2013). Distributed and cloud computing: from parallel processing to the
5. Rosenberg, J. and Mateos, A., (2010). The cloud at your service. Manning Publications Co.
21