0% found this document useful (0 votes)
116 views

Unit-3 (Part-I

The document discusses various cloud computing mechanisms and architectures. It describes broadband networks and internet architecture, including how the internet is structured in a hierarchical topology composed of Tier 1, Tier 2, and Tier 3 providers. It also discusses data center technology, focusing on virtualization, standardization, automation, remote management, high availability, security, facilities, computing hardware, storage hardware, and network hardware that make up modern data centers. Finally, it covers virtualization technology and what types of IT resources like servers and storage can be virtualized.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views

Unit-3 (Part-I

The document discusses various cloud computing mechanisms and architectures. It describes broadband networks and internet architecture, including how the internet is structured in a hierarchical topology composed of Tier 1, Tier 2, and Tier 3 providers. It also discusses data center technology, focusing on virtualization, standardization, automation, remote management, high availability, security, facilities, computing hardware, storage hardware, and network hardware that make up modern data centers. Finally, it covers virtualization technology and what types of IT resources like servers and storage can be virtualized.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 36

Unit-3 (Part-I)

• CLOUD COMPUTING MECHANISMS AND


ARCHITECTURE: Cloud-Enabling Technology: Broadband
networks and Internet architecture, Datacenter technology,
Virtualization technology, Web technology, Multitenant
technology, Service technology. Cloud Architectures:
Architecture - Workload distribution, Resource pooling,
Dynamic scalability, Elastic resource capacity, Service load
balancing, Cloud bursting, Elastic disk provisioning,
Redundant storage.
Broadband Networks and
Internet Architecture
•Internet Service Providers (ISPs)
•Connectionless Packet Switching (Datagram Networks)
•Router-Based Interconnectivity
•Technical and Business Considerations
Broadband Networks and Internet Architecture
Internet Service Providers (ISPs)
•ISP’s can freely deploy, operate and manage their
networks.
•The Internet’s topology has become a dynamic and
complex aggregate of ISPs that are highly
interconnected via its core protocols.
•No centralized entity comprehensively governs the
Internet.
•Internet Corporation for Assigned Names and Numbers
(ICANN).
Broadband Networks and Internet Architecture

Worldwide connectivity is enabled through a hierarchical topology composed of


•Tier 1
• Tier 2
• Tier 3

Figure 2. An abstraction of the internetworking structure of the Internet


Broadband Networks and Internet Architecture
•Worldwide connectivity is enabled through a hierarchical topology
composed of Tiers 1, 2, and 3.
•The core Tier 1 is made of large-scale, international cloud providers
that oversee massive interconnected global networks, which are
connected to Tier 2’s large regional providers.
•The interconnected ISPs of Tier 2 connect with Tier 1 providers, as
well as the local ISPs of Tier 3.
• Hence, Cloud consumers and cloud providers can connect directly
using a Tier 1 provider, as any operational ISP can enable Internet
connection
Broadband Networks and Internet Architecture
Two fundamental components used to construct the internetworking
architecture are
1.Connectionless packet switching (datagram networks) and
2. Router-based interconnectivity.
1.Connectionless Packet Switching (Datagram Networks):
•End-to-end (sender-receiver pair) data flows are divided into
packets of a limited size that are received and processed through
network switches and routers, then queued and forwarded from one
intermediary node to the next
Broadband Networks and Internet Architecture
•Each packet carries the necessary location information, such as the Internet
Protocol (IP) or Media Access Control (MAC) address, to be processed and routed
at every source, intermediary, and destination node.
2. Router-based interconnectivity:
•A router is a device that is connected to multiple networks through which it
forwards packets.
•The cloud consumer and cloud provider path involves multiple ISP networks and
very obvious of network failures for which alternate network path is selected
during runtime only.
•So, Communications can be sustained during network failures, but with routing
fluctuations and latency.
Figure 3. Packets traveling through the Internet are directed by a router that arranges
them into a message
Figure 4. A generic view of the Internet reference model and protocol stack
3.Technical and Business Considerations:
Connectivity Issues: TCP/IP facilitates both Internet access and on-premise data exchange
over LANs.
Each packet carries needy information like Internet Protocol (IP) or Media Access Control
(MAC) , to be processed & routed at every source, intermediary and destination node.

Figure 5. The internetworking architecture of a private cloud. The physical IT resources that
constitute the cloud are located and managed within the organization
3.Technical and Business Considerations:

Figure 6. The internetworking architecture of an Internet-based cloud deployment model.


The Internet is the connecting agent between non-proximate cloud consumers, roaming
end-users, and the cloud provider’s own network
Broadband Networks and Internet Architecture
Table 7. A comparison of on-premise and cloud-based internetworking

Network Bandwidth and Latency Issues:


•Latency is the amount of time it takes a packet to travel from one data node to another.It is
directly proportional to no. of intermediary nodes on the data packet’s path
Broadband Networks and Internet Architecture
Cloud Carrier and Cloud Provider Selection :
• QoS management across multiple ISPs is difficult to achieve in practice, requiring
collaboration of the cloud carriers on both sides to ensure that their end-to-end service levels
are sufficient for business requirements.
Data Center Technology
• Data centers exist as specialized IT infrastructure used to house centralized IT resources,
such as servers, databases, networking and telecommunication devices, and software
systems.
comprised of the following technologies and components:
•Virtualization
•Standardization and Modularity
•Automation
•Remote Operation and Management
•High Availability
•Security-Aware Design, Operation, and Management
•Facilities
•Computing Hardware
•Storage Hardware
•Network Hardware
•Other Considerations
Data Center Technology
1.Virtualization:
•Data centers consist of both physical and virtualized IT resources.
•Virtualized components that are easier to allocate, operate, release, monitor, and control.

Figure 8. The common components of a data center working together to provide virtualized IT resources supported by
physical IT resources.
Data Center Technology
2.Standardization and Modularity:

•Modularity and standardization are key requirements for reducing investment and operational costs
as they enable economies of scale for the procurement, acquisition, deployment, operation, and
maintenance processes.

•Consolidated IT resources can serve different systems and be shared among different cloud consumers
3.Automation:

•Data centers have specialized platforms that automate tasks like provisioning, configuration,

patching, and monitoring without supervision.

•Advances in data center management platforms and tools leverage autonomic computing technologies

to enable self-configuration and self-recovery.


Data Center Technology
4.Remote Operation and Management:
•Most of the operational and administrative tasks of IT resources in data centers are commanded through the
network’s remote consoles and management systems.
•Technical personnel are not required to visit the dedicated rooms that house servers, except to perform
highly specific tasks, such as equipment handling and cabling or hardware-level installation and maintenance
5.High Availability:
•Data center outage significantly impacts business continuity for the organizations that use their services, data
centers are designed to operate with increasingly higher levels of redundancy to sustain availability.
•Data centers usually have redundant, uninterruptable power supplies, cabling, and environmental control
subsystems in anticipation of system failure, along with communication links and clustered hardware for
load balancing.
Data Center Technology
6.Security-Aware Design, Operation, and Management:
•physical and logical access controls and data recovery strategies, need to be thorough and
comprehensive for data centers, since they are centralized structures that store and process
business data.
•Outsourcing data center-based IT resources has been a common industry practice for decades.
However, the outsourcing models often required long-term consumer commitment

7.Facilities:
•Facilities are custom-designed locations that are outfitted with specialized computing, storage,
and network equipment These facilities have several functional layout areas, as well as various
power supplies, cabling, and environmental control stations that regulate heating, ventilation, air
conditioning, fire protection, and other related subsystems.
Data Center Technology
8.Computing Hardware:

•Data centers is often executed by standardized commodity servers that have substantial computing
power and storage capacity.
•Rackmount form factor server design composed of standardized racks with interconnects for power,
network, and internal cooling.
•support for different hardware processing architectures, such as x86-32bits, x86-64, and RISC

•A power-efficient multi-core CPU architecture that houses

hundreds of processing cores in a space as small as a single

unit of standardized racks


•Redundant and hot-swappable components, such as hard disks, power supplies, network interfaces, and
storage controller cards.
Data Center Technology
9.Storage Hardware:
•Data centers have specialized storage systems that maintain enormous amounts of
digital information in order to fulfill considerable storage capacity needs.
•storage systems are containers housing numerous hard disks that are organized into
arrays.
Data Center Technology
10.Network Hardware:
•Data centers require extensive network hardware in order to enable multiple levels of
connectivity.
•Data Center is broken down into five network subsystem:
•Carrier and External Networks Interconnection
•Web-Tier Load Balancing and Acceleration
•LAN Fabric
•SAN Fabric
•NAS Gateways (Network Attached Storage)
11.Other Considerations:
•IT hardware is subject to rapid technological obsolescence, with lifecycles that typically
last between five to seven years.
•Security is another major issue when considering the role of the data center and the vast
quantities of data contained within its doors
Virtualization Technology
Virtualization : The process of converting a physical IT resource into a virtual IT
resource.
What can be virtualized:
•Servers – A physical server can be abstracted into a virtual server.
•Storage – A physical storage device can be abstracted into a virtual storage device or a
virtual disk.
•Network – Physical routers and switches can be abstracted into logical network fabrics,
such as VLANs.
•Power – A physical UPS and power distribution units can be abstracted into what are
commonly referred to as virtual UPSs.
Hardware Independence:
Virtual servers can easily be moved to another virtualization host, automatically resolving
multiple hardware-software incompatibility issues.
Virtualization Technology
Server Consolidation : Different virtual servers to share one physical server.
Resource Replication:
•Virtual servers are created as virtual disk images that contain binary file copies of hard
disk content.
•Virtual disk images are accessible to the host’s operating system, meaning simple file
operations, such as copy, move, and paste, can be used to replicate, migrate, and back up the
virtual server.
Virtualization Technology
Operating System-Based Virtualization:
•Operating system-based virtualization is the installation of virtualization software in a pre-existing
operating system, which is called the host operating system.

•Hardware independence that is enabled by virtualization


allows hardware IT resources to be more flexibly used.

•Virtualization software translates hardware IT resources


that require unique software for operation into virtualized
IT resources that are compatible with a range of operating
systems

Figure 8. The different logical layers of operating system


-based virtualization, in which the VM is first installed
into a full host operating system and subsequently used
to generate virtual machines.
Virtualization Technology
•System-based services that are available as administration tools can be used to manage the physical
host.
•Estimating, monitoring, and managing the resulting impact can be challenging because it requires
expertise in system workloads, software and hardware environments, and sophisticated monitoring
tools.
Hardware-Based Virtualization:
•Represents the installation of virtualization software
directly on the physical host hardware so as to bypass
the host operating System .

•Virtualization software is typically referred to as a


hypervisor for this type of processing

•A hypervisor has a simple user-interface that requires


a negligible amount of storage space

Figure 9. The different logical layers of hardware-based


Virtualization Technology
•Main issues of hardware-based virtualization concerns compatibility with hardware
devices
Virtualization Management:
•Modern virtualization software provides several advanced management functions that can
automate administration tasks and reduce the overall operational burden on virtualized IT
resources
•Virtualized IT resource management is often supported by virtualization infrastructure
management (VIM) tools that collectively manage virtual IT resources and rely on a
centralized management module.
Other Considerations:
•Performance Overhead – Virtualization may not be ideal for complex systems that have high
workloads with little use for resource sharing and replication.
•Special Hardware Compatibility – Many hardware vendors that distribute specialized
hardware may not have device driver versions that are compatible with virtualization software
•Portability – The programmatic and management interfaces that establish administration
environments for a virtualization program to operate with various virtualization solutions can
introduce portability gaps due to incompatibilities
Web Technology
•Cloud Computing’s fundamental reliance is on Internetworking, Web browser universality and the
ease of web-based service development.
•Web technology is generally used as both the implementation medium and the management interface
for cloud services.
Basic Web Technology:
•Uniform Resource Locator(URL): A standard syntax used for creating identifiers that point to
Web-based resources, the URL is often structured using a logical network location.
•Hypertext Transfer Protocol(HTTP): This is the primary communications protocol used to
exchange content and data throughout the World Wide Web. URL’s are typically transmitted via
HTTP.
•Markup Languages(HTML,XML): Markup languages provide a lightweight means of expressing
Web-centric data and metadata. The two primary markup languages:
HTML which is used to express the presentation of Web pages.
XML which allows for the definition of vocabularies used to associate meaning to Web-
based data via metadata.
Web Technology
•A distributed application that uses Web-
based technologies is typically termed as
Web applications.

•These can be found in all kinds of Cloud-


based environment as they have high
accessibility.
Multitenant Technology
•The multitenant application design was created to enable multiple users to
access the same application logic simultaneously.

•Each tenant has its own view of the application that it uses, administers and
customizes as a dedicated instance of the software while remaining unaware of
other tenants that are using the same application.

•Multitenant applications ensure that tenants do not have access to data and
configuration information that is not their own.

•Multitenant application architecture is often significantly more complex than


that of single-tenant applications.
Multitenant Technology
•Tenants can individually customize features of the application, such as:
1.User Interface: Tenants can define a specialized “look and feel” for their
application interface.

2.Business Process: Tenants can customize the rules, logic, and workflows of
the business processes that are implemented in the application.

3.Data Model: Tenants can extend the data schema of the application to include,
exclude, or rename fields in the application data structures.

4.Access Control: Tenants can independently control the access rights for users
and groups.
Multitenant Technology
Characteristics:
•Usage Isolation
•Data Security
•Recovery
•Application Upgrades
•Scalability
•Metered Usage
•Data Tier Isolation
Multitenant Technology
Common Characteristics of multitenant application include :
•Usage Isolation: The usage behavior of one tenant does not affect the application
availability and performance of other tenants
•Data Security: Tenants cannot access data that belongs to other tenants
•Recovery: Backup and restore procedures are separately executed for the data of each tenant
•Application Upgrades: Tenants are not negatively affected by the synchronous upgrading of
shared software artifacts.
• Scalability: The application can scale to accommodate increases in usage by existing
tenants and / or increases in the number of tenants
• Metered Usage : Tenants are charged only for the application processing and features that
are actually consumed
•Data Tier Isolation: Tenants can have individual databases, tables, and/or schemas isolated
from other tenants. Alternatively, databases, tables, and/or schemas can be designed to be
intentionally shared by tenants
Multitenant Technology
Multitenancy is sometimes mistaken for virtualization because the concept of
multiple tenants is similar to the concept of virtualized instances.

The differences lie in what is multiplied within a physical server acting as host.
•With virtualization: Multiple virtual copies of the server environment can be
hosted by a single physical server. Each copy can be provided to different users,
can be configured independently, and can contain its own operating systems and
applications.
•With multitenancy: A physical or virtual server hosting an application is
designed to allow usage by multiple different users. Each user feels as though they
have exclusive usage of the application.
Service Technology
Service technology is a keystone foundation of cloud computing that formed the basis of
the “as-a-service” cloud delivery models.
Web Services:
•Web Service Description Language (WSDL): This markup language is used to create a
WSDL definition that defines the application programming interface (API) of a Web
service.
•XML Schema Definition Language (XML Schema): Messages exchanged by Web
services must be expresses using XML.
•SOAP: Familiarly known as the Simple Object Access Protocol, this standard defines a
common messaging format used for request and response messages exchanged by Web
services.
•Universal Description, Discovery, and Integration (UDDI): This standard regulates
service registries in which WSDL definitions can be published as part of a service catalog
for discovery purposes.
Service Technology
ReST (Representational State Transfer) Services
ReST services are designed according to a set of constraints that shape the service
architecture to emulate the properties of the World Wide Web.
ReST services do not have individual technical interfaces but instead share a common
technical interface that is known as the uniform contract, which is typically established via the use of
HTTP methods.

The six ReST design constraints are:

•Client-Server
•Stateless
•Cache
•Interface/Uniform Contract
•Layered System
•Code-On-Demand
Service Technology
Service Agents
Service agents are event-driven programs designed to intercept messages at runtime.
There are two types of service agents:
•Active service agents perform an action upon intercepting and reading the contents of a message
•Passive service agents, on the other hand, do not change message contents.

Service Middleware
Middleware platforms that evolved from messaging-oriented middleware (MOM) platforms used
primarily to facilitate integration, to sophisticated service middleware platforms designed to
accommodate complex service compositions.
Two most common types of middleware platforms relevant to services computing are:
•Enterprise service bus(ESB): encompass a range of intermediary processing features including service
brokerage routing and message queuing.
•Orchestration platform: environments are designed to host and execute workflow logic that drives the
runtime composition of services.

You might also like