Unit 2
Unit 2
Cloud Computing , which is one of the demanding technology of the current time
and which is giving a new shape to every organization by providing on demand
virtualized services/resources. Starting from small to medium and medium to large,
every organization use cloud computing services for storing information and
accessing it from anywhere and any time only with the help of internet. In this
article, we will know more about the internal architecture of cloud computing.
Transparency, scalability, security and intelligent monitoring are some of the most
important constraints which every cloud infrastructure should experience. Current
research on other important constraints is helping cloud computing system to come up
with new features and strategies with a great capability of providing more advanced
cloud solutions.
Cloud Computing Architecture :
The cloud architecture is divided into 2 parts i.e.
1. Frontend
2. Backend
The below figure represents an internal architectural view of cloud computing.
1. Hypervisor :
Hypervisor is a firmware or a low level program which is a key to enable
virtualization. It is used to divide and allocate cloud resources between several
customers. As it monitors and manages cloud services/resources that’s why hypervisor
is called as VMM (Virtual Machine Monitor) or (Virtual Machine Manager).
2. Management Software :
Management software helps in maintaining and configuring the infrastructure. Cloud
management software monitors and optimizes resources, data, applications and
services.
3. Deployment Software :
Deployment software helps in deploying and integrating the application on the cloud.
So, typically it helps in building a virtual computing environment.
4. Network :
It is one of the key component of cloud infrastructure which is responsible for
connecting cloud services over the internet. For the transmission of data and resources
externally and internally network is must required.
5. Server :
Server which represents the computing portion of the cloud infrastructure is
responsible for managing and delivering cloud services for various services and
partners, maintaining security etc.
6. Storage :
Storage represents the storage facility which is provided to different organizations for
storing and managing data. It provides a facility of extracting another resource if one
of the resource fails as it keeps many copies of storage.
Along with this, virtualization is also considered as one of important component of
cloud infrastructure. Because it abstracts the available data storage and computing
power away from the actual hardware and the users interact with their cloud
infrastructure through GUI (Graphical User Interface).
2. The actors of this layer are the end users or the clients.
3. The clients are the devices that can either be a thick client, a thin client, or a mobile device
capable of accessing the web application.
4. Here a thick client is a computer that is capable of working independently. Whereas, the thin
client is the one with the low processing capability. It depends on another device for complete
functionality.
5. At layer 1, the user or client initiate to connect themselves to the cloud. Accessing cloud
applications is similar to accessing web applications.
6. It has Access to both types of applications requires the internet or other computer
networks. Although the internal properties of the cloud application are different from web
applications. Hence, we require layer 1 to set up the connection between the user/client and
the cloud.
1. Layer 2 or the network layer is responsible for connecting users to the cloud. The
absence of a network layer wouldn’t work for the cloud. Because the entire infrastructure
of the cloud depends on the connection where it offers the services to the users.
2. For accessing the public cloud we make connections using the internet. For accessing the
private cloud, the connectivity is established using the local area network, i.e. (LAN).
Each kind of connection requires a minimum bandwidth specified by the cloud providers.
3. However, the network layer is beyond the cloud SLA i.e. service level agreement. SLA
promises a minimum level of services to cloud customers. SLA does not consider the
connection between the cloud and the user for quality of service (QoS).
The layer is responsible for managing the cloud services. It includes the software that manages the
working of the cloud. The software used at this layer can be:
• responsible for creating an interface between the cloud and its users.
➢ Optimization (Server consolidation i.e. reducing the total number of servers of the company
by making efficient use of server resources, workload consolidation i.e. integrating
multiple computational operations onto fewer platforms, storage consolidation i.e.
centralizing the data storage and minimizing the time required to access data)
➢ Internal cloud governance, the network layer comes under close surveillance of SLA.
Thus, the operations that take place at this layer will affect the agreement that SLA decide
between the cloud users and the providers.
1. It defines the provision of hardware resources. Layer 4 of a public cloud is the huge data
centre. Whereas layer 4 of the private cloud is constructed with a huge collection of
hardware resources.
2. These resources are interconnected to each other and are present at a specific location or
it may be a high configuration system.
3. The hardware resource layer comes under the purview of service layer agreements (SLAs).
We can even say that the layer governs SLAs.
4. As we have discussed previously that the user must be able to access the cloud services as
quick as possible.
5. If there occurs any discrepancy in the provisioning of the hardware resources then the
provider might have to pay the penalty.
3. Multi-Cloud Service: Clients use a service to access various clouds. The cloud
client hosts a service either inside or externally. The services include elements for
brokers. The inter-cloud initiatives OPTIMUS, contrail, MOSAIC, STRATOS, and
commercial cloud management solutions leverage multi-cloud services.
4. Multi-Cloud Libraries: Clients use a uniform cloud API as a library to create their
own brokers. Inter clouds that employ libraries make it easier to use clouds
consistently. Java library J-clouds, Python library Apache Lib-Clouds, and Ruby
library Apache Delta-Cloud are a few examples of multiple multi-cloud libraries.
Memory
Bandwidth
Provisioning of resources to users is a challenging problem. The difficulty comes from the
following
o Unpredictability of consumer demand
o Heterogeneity of services
o Power management
Resource provisioning is the process of choosing, deploying, and managing software (like load
balancers and database server management systems) and hardware resources (including CPU,
storage, and networks) to assure application performance.
Types of cloud provisioning
The three models are
1. Advanced Provisioning,
2. Dynamic Provisioning And
3. User Self-provisioning.
Cloud infrastructure providers (i.e., IaaS providers) have established data centers in multiple
geographical locations to provide redundancy and ensure reliability in case of site failures.
Amazon does not provide seamless/automatic mechanisms for scaling its hosted services
across multiple geographically distributed data centers.
First, it is difficult for cloud customers to determine in advance the best location for hosting
their services as they may not know the origin of consumers of their services.
Second, SaaS providers may not be able to meet the QoS expectations of their service
consumers originating from multiple geographical locations.
The availability of a banking system ensures that financial transactions related to SLAs are
carried out in a securely.
They consist of client brokering and coordinator services that support utility-driven federation
of clouds:
o application scheduling
o resource allocation
o migration of workloads.
The architecture cohesively couples the administratively and topologically distributed storage
and compute capabilities of clouds as part of a single resource leasing abstraction.
The system will ease the crossdomain capability integration for on-demand, flexible, energy-
efficient, and reliable access to the infrastructure based on virtualization technology
The Cloud Exchange (CEx) acts as a market maker for bringing together service producers and
consumers.
It aggregates the infrastructure demands from application brokers and evaluates them against
the available supply currently published by the cloud coordinators.
CEx allows participants to locate providers and consumers with fitting offers.
WEB
1. The web is vast inter connected global information system. Information on the web is hosted
on web sites which contain text, pictures and multimedia which can be viewed using Web
browsers like internet explorer, firefox and lynx.
2. A web site can be accessed by using browser. We need to type in the URL of the web site for
the browser to retrieve information on the web site. A typical URL is as follows.
http://www.google.com
The first part of the URL is called the URI, which indicates the application protocol used to
access the resource.
A web site is hosted on a web server. The web server facilitates accessing of a web site using
browser.
A web service is also hosted on a web server. So, a web service uses the web(inter connected
global information system) to be accessed and used.
XML
1. XML is a mark up language. With a mark up language, we can structure a document using tags.
Using XML, we can customize the tags also.
2. Each bit of information in a document is defined by tags without overload of formatting present in
HTML.
SOA
2. Web services rely on these patterns and client applications connect to a service using these
patterns.
3. In the SOA concept, three basic roles are defined. They are :
1. Simple Object Access Protocol (SOAP) is an XML protocol. It is used by client applications
to communicate with Web services.
2. SOAP is a simple, consistent, and extensible mechanism allowing a client application to send
an XML message to any other application.
3. SOAP implements an envelope for sending an XML message. We put an XML message into
an envelope and send it across the networks.
4. In other words SOAP envelope is a container for the XML message.A SOAP envelope is
transported by various communication protocols. But, the most common way to transfer
SOAP messages is to use HTTP. Other Web protocols commonly used are SMTP and FTP.
Instead of investing upfront costs for servers, you You no longer need to wait to procure,
can opt to use the infrastructure of a cloud service set up, and configure computing
provider. Dynamic provisioning allows you to infrastructure. Cloud architectures
further optimize spending by paying only for the enable you to get up and running fast,
computing resources you use. so you spend more time focusing on
developing and delivering new
products.
Accelerated transformation High availability
Cloud-native architectures like Kubernetes let you Applications run and managed on
make the most of cloud services and automated cloud architectures benefit from high-
environments to speed up modernization and drive performance computing resources that
digital transformation. ensure continuous availability,
regardless of fluctuating loads.
Cloud-Native is complex. Reworking and moving an existing application to the cloud is not an
easy job. They have to be re-architected for the cloud, and organizations also require the
underlying infrastructure that is required to support this migration.
Another cost is giving up portability. Applications that have been localized for one cloud
platform cannot be easily ported to another cloud platform. This involves a large amount of
rewriting the software and refactoring the code. Therefore, for all practical purposes, you are
locked into one cloud platform.