Cloud
Cloud
1
Contents
• Network perimeter
• Virtual server
• Cloud storage device
• Cloud usage monitor.
• Resource replication.
• Ready-Made Environment
2
Cloud Infrastructure Mechanisms
Cloud infrastructure mechanisms are the fundamental building block of
cloud computing environment. It need the following components.
Logical Network perimeter– Techniques to implement networks in cloud.
Virtual server -- Techniques to implement machines in cloud.
Cloud storage device -- Techniques to implement storage in cloud.
Cloud storage monitor -- Techniques to implement monitor usage of
cloud resource.
Resource replication-- Techniques to implement replicate/duplicate
resources in cloud such as networks, machines ,software's etc.
Ready-made environment -- Techniques to provide ready made platform
solution to do something.
3
3.1 Logical Network Perimeter
• Logical network perimeter is a isolation of a network
environment from the rest of a communication network
• The logical network perimeter establishes the virtual network
boundary that can include and isolate group of related Cloud
based IT resources that may be physically distributed.
• This can be implemented to
• Isolate IT resources in a cloud from non-authorized users.
• Isolate IT resources in a cloud from non-users
• Isolate IT resources in a cloud from cloud consumers .
• Control the bandwidth that is available to isolated IT
resources.
4
Contin..
Logical network perimeters are established via network devices that
supply and control the connectivity of data center and its IT resources
are virtualized that include
Virtual Firewall – It is a protection software that provides the
network traffic filtering and monitoring for virtual machines in a
virtualized environment.
Virtual Network – This is IT resource that isolates the network
environment within the data center infrastructure.
Ex: VPN,VLAN
VPAN restricts the browsing history to public.
Facilitates encryption.
5
• Virtual firewall (top) and virtual network. (bottom)
6
Two logical network perimeters surround the cloud
consumer and cloud provider environments.
• In which one logical network
perimeter contains a cloud
consumer’s on-premise environment,
while another contains a cloud
provider’s cloud-based environment.
• These perimeters are connected
through a VPN that protects
communications, since the VPN is
typically implemented by point-to-
point encryption of the data packets
sent between the communicating
endpoints.
7
DTGov Logical network perimeter
9
The first physical server hosts two virtual
10
servers, while the second physical server hosts
• As a commodity mechanism ,the virtual server represents the most
foundational building block of cloud environments
• Virtual server(IT resource) can be used to host
numerous IT resources(eg:CPU,Storage,Memory)
cloud based solutions(such as JAVA platform)
cloud computing mechanisms (service agent program
that monitors the cloud)
11
Virtual server that hosts a cloud service
being accessed by Cloud Service
Consumer B, while Cloud Service
Consumer A accesses the virtual server
directly to perform an administration
task.
13
• In order to enable the on-demand creation of virtual servers, DTGOV
provides cloud consumers with a set of template virtual servers that
are made available through pre-made VM images.
• These VM images are files that represent the virtual disk images used
by the hypervisor to boot the virtual server. DTGOV enables the
template virtual servers to have various initial configuration options
that differ, based on operating system, drivers, and management
tools being used. Some template virtual servers also have additional,
pre-installed application server software.
• The following virtual server packages are offered to DTGOV’s cloud
consumers. Each package has different pre-defined performance
configurations and limitations:
14
• Small Virtual Server Instance – 1 virtual processor core, 4 GB of virtual
RAM, 20 GB of storage space in the root file system.
• Medium Virtual Server Instance – 2 virtual processor cores, 8 GB of
virtual RAM, 20 GB of storage space in the root file system.
• Large Virtual Server Instance – 8 virtual processor cores, 16 GB of
virtual RAM, 20 GB of storage space in the root file system
• Memory Large Virtual Server Instance – 8 virtual processor cores, 64
GB of virtual RAM, 20 GB of storage space in the root file system
• Processor Large Virtual Server Instance – 32 virtual processor cores,
16 GB of virtual RAM, 20 GB of storage space in the root file system
• Ultra-Large Virtual Server Instance – 128 virtual processor cores, 512
GB of virtual RAM, 40 GB of storage space in the root file system
15
• Additional storage capacity can be added to a virtual server by attaching a
virtual disk from a cloud storage device.
• All of the template virtual machine images are stored on a common cloud
storage device that is accessible only through the cloud consumers’
management tools that are used to control the deployed IT resources.
• Once a new virtual server needs to be instantiated, the cloud consumer
can choose the most suitable virtual server template from the list of
available configurations. A copy of the virtual machine image is made and
allocated to the cloud consumer, who can then assume the administrative
responsibilities.
• The allocated VM image is updated whenever the cloud consumer
customizes the virtual server.
• After the cloud consumer initiates the virtual server, the allocated VM
image and its associated performance profile is passed to the VIM, which
creates the virtual server instance from the appropriate physical server.
16
DTGov uses the process which is shown in figure for
the creation and management of virtual servers that
have different initial software configurations and
performance characteristics.
19
Cloud storage levels
• Cloud storage device mechanisms provide common logical units of data
storage, such as:
• Files – Collections of data are grouped into files that are located in folders.
(Amazon EFS, Google Cloud Filestore, or Azure Files, )
• Blocks – The lowest level of storage and the closest to the hardware, a
block is the smallest unit of data that is still individually accessible.
(Amazon EBS, Google Cloud Persistent Disk, or Azure
Managed Disks,)
• Datasets – Sets of data are organized into a table-based, delimited, or
record format.
• Objects – Data and its associated metadata are organized as Web-based
resources.( Ex:S3 using web url) Amazon S3, Google Cloud
Storage, or Azure Blob
20
Figure: Different cloud service consumers utilize different technologies
to interface with virtualized cloud storage devices.
21
Network Storage Interfaces
• Legacy network storage falls under the category of network storge interface.
• It include storage devices with industry standard protocols such as SCSI for
storage blocks, server message blocks(SMB), common file system (CIFS),
network file system(NFS) for file and network storage.
• In file storage system each data stores in a separate file with different file
size and formats organized in to folders and subfolders.
• When cloud storage device mechanism is based on this type interface its
data searching and extraction is suboptimal.
• Block storage allows data to be stored in a fixed format(Data Blocks) that
can be accessed and the storage format is closest to hardware.
• Using logical unit number or virtual volume block-level storage is better
than file-level storage.
22
Object Storage Interfaces
• Various types of data can be stored as web resources. This is referred
as object storage.
• Cloud Storage Device mechanisms that implement this interface can
typically be accessed via REST or Web service-based cloud services
using HTTP as the prime protocol.
• The Storage Networking Industry Association’s Cloud Data
Management Interface (SNIA’s CDMI) supports the use of object
storage interfaces.
23
Database Storage Interfaces
• Cloud storage device mechanisms based on database storage interfaces typically support a query
language in addition to basic storage operations.
• There are two types
Relational data storage- A cloud storage device mechanism implemented using relational data
storage could be based on any number of commercially available database products, such as IBM
DB2, Oracle Database, Microsoft SQL Server, and MySQL.
Challenges with the mechanism is scaling and performance.
Scaling a relational cloud storage device vertically can be more complex and cost-ineffective than
horizontal scaling.
Non relational data storage –
Non-relational storage (also commonly referred to as NoSQL storage). NoSQL database
doesn't use tables for storing data. NoSQL databases, house data within one data
structure, such as JSON document.
Since this non-relational database design does not require a schema, it offers
rapid scalability to manage large and typically unstructured data sets.
• Non-relational storage can be more horizontally scalable than relational storage.
24
CASE STUDY: DTGOV provides cloud consumers access to a cloud storage device based on an object
storage interface.
The object-based cloud storage device has an underlying
storage system with variable storage capacity, which is directly
controlled by a software component that also exposes the
interface. This software enables the creation of isolated cloud
storage devices that are allocated to cloud consumers. The
storage system uses a security credential management system
to administer user-based access control to the device’s data
objects .
The cloud consumer interacts with the usage and
administration portal to create a cloud storage device and
define access control policies (1). The usage and
administration portal interact with the cloud storage
software to create the cloud storage device instance and
apply the required access policy to its data objects (2). Each
data object is assigned to a cloud storage device and all of
the data objects are stored in the same virtual storage
volume. The cloud consumer uses the proprietary cloud
storage device UI to interact directly with the data objects
(3).
25
The creation of the cloud consumers’ block-based cloud storage
devices is managed by the virtualization platform, which instantiates
the LUN’s implementation of the virtual storage.
27
Monitoring agent
• A monitoring agent is an intermediary, event driven program that exists as a service agent and
reside along existing communication paths to transparently monitor and analyse the dataflows.
• This type of cloud usage monitor is used to measure the network traffic and message metrics.
28
Resource agent
• A resource agent is a processing module that collects usage data by having event-driven
interactions with specialized resource software.
• This module is used to monitor usage metrics based on pre-defined, observable events at the
resource software level, such as initiating, suspending, resuming, and vertical scaling.
29
Polling Agent
• A polling agent is a processing module that collects cloud service usage data by polling IT
resources. This type of cloud service monitor is commonly used to periodically monitor IT
resource status, such as uptime and downtime.
A polling agent monitors the status of a cloud service hosted by a virtual server by sending periodic
polling request messages and receiving polling response messages that report usage status “A” after
a number of polling cycles, until it receives a usage status of “B” (1), upon which the polling agent
records the new usage status in the log database (2).
30
Case study:
DTGOV implements a resource agent that relies on the resource usage events
generated by the VIM platform to calculate the virtual server usage data.
The resource agent is designed with logic and metrics that are based on the
following rules:
1. Each resource usage event that is generated by the VIM software can
contain the following data:
• Event Type (EV_TYPE) – Generated by the VIM platform, there are five types
of events:
VM Starting (creation at the hypervisor)
VM Started (completion of the boot procedure)
VM Stopping (shutting down)
VM Stopped (termination at the hypervisor)
VM Scaled (change of performance parameters)
31
Contin..
• VM Type (VM_TYPE) – This represents a type of virtual server, as
dictated by its performance parameters. A predefined list of possible
virtual server configurations provides the parameters that are
described by the metadata whenever a VM starts or scales.
• Unique VM Identifier (VM_ID) – This identifier is provided by the VIM
platform.
• Unique Cloud Consumer Identifier (CS_ID) – Another identifier
provided by the VIM platform to represent the cloud consumer.
• Event Timestamp (EV_T) – An identification of an event occurrence
that is expressed in date-time format, with the time zone of the data
center and referenced to UTC as defined in RFC 3339 (as per the ISO
8601 profile)
32
Contin..
2. Usage measurements are recorded for every virtual server that a
cloud consumer creates.
3. Usage measurements are recorded for a measurement period whose
length is defined by two timestamps called tstart and tend. The start of
the measurement period defaults to the beginning of the calendar
month (tstart = 2012-12-01T00:00:00-08:00) and finishes at the end of
the calendar month (tend = 2012-12-31T23:59:59-08:00). Customized
measurement periods are also supported.
4. Usage measurements are recorded at each minute of usage. The
virtual server usage measurement period starts when the virtual server
is created at the hypervisor and stops at its termination
33
Contin..
5. Virtual servers can be started, scaled, and stopped multiple times during
the measurement period. The time interval between each occurrence i (i = 1,
2, 3,...) of these pairs of successive events that are declared for a virtual
server is called a usage cycle that is known as Tcycle_i:
• VM_Starting, VM_Stopping – VM size is unchanged at the end of the cycle
• VM_Starting, VM_Scaled – VM size has changed at the end of the cycle
• VM_Scaled, VM_Scaled – VM size has changed while scaling, at the end of
the cycle
• VM_Scaled, VM_Stopping – VM size has changed at the end of the cycle
34
Contin ..
6. The total usage, Utotal, for each virtual server during the
measurement period is calculated using the following resource usage
event log database equations:
• For each VM_TYPE and VM_ID in the log
• As per the total usage time that is measured for each VM_TYPE, the
vector of usage for each VM_ID is Utotal: Utotal = {type 1,
Utotal_VM_type_1, type 2, Utotal_VM_type_2, ...}
35
• The cloud consumer (CS_ID = CS1) requests the creation of a
virtual server (VM_ID = VM1) of configuration size type 1
(VM_TYPE = type1) (1)
• The VIM creates the virtual server (2a).
• The VIM’s event-driven API generates a resource usage event
with timestamp = t1, which the cloud usage monitor software
agent captures and records in the resource usage event log
database (2b).
• Virtual server usage increases and reaches the auto-scaling
threshold (3).
• The VIM scales up Virtual Server VM1 (4a)
• from configuration type 1 to type 2 (VM_TYPE = type2). The VIM’s
event-driven API generates a resource usage event with
timestamp = t2, which is captured and recorded at the resource
usage event log database by the cloud usage monitor software
agent (4b).
• The cloud consumer shuts down the virtual server (5)
• The VIM stops Virtual Server VM1 (6a)
• and its event driven API generates a resource usage event with
timestamp = t3, which the cloud usage monitor software agent
captures and records at the log database (6b).
• The usage and administration portal accesses the log database
and calculates the total usage (Utotal) for Virtual Server Utotal
VM1 (7) 36
7.5 Resource Replication
• Virtualization technology is used to
implement the resource replication
mechanism to replicate cloud-based IT
resources.
• The hypervisor replicates several
instances of a virtual server, using a
stored virtual server image.
• Such replication is independently of the
location where the resource needs to be
replicated.
• Such replication technique makes
resource available at any place.
• In case of resource failure, the resource
can be replicated anywhere.
37
Case study:
DTGOV establishes a set of high-availability
virtual servers that can be automatically
relocated to physical servers running in
different data centers in response to
severe failure conditions.
38
The virtual server becomes
unavailable in Data Center A. VIM in
Data Center B detects the failure
condition and starts to reallocate the
high availability server from Data
Center A into Data Center B.
39
A new instance of the virtual
server is created in Data Center
B and the service becomes
available.
40
3.6 Ready-Made Environment
• The ready-made environment mechanism is a defining component of
the PaaS cloud delivery model that represents a predefined, cloud-
based platform comprised of a set of already installed IT resources,
ready to be used and customized by a cloud consumer.
41
Case study:Development and deployment
environment for ATN’s Part Number Catalog
application.
The developer uses the provided SDK to develop the Part
Number Catalog Web application (1).
The application software is deployed on a Web platform that
was established by two ready-made environments called the
front-end instance (2a)
and the back-end instance (2b).
The application is made available for usage and one end-user
accesses its front-end instance (3).
The software running in the front-end instance invokes a long-
running task at the back-end instance that corresponds to the
processing required by the end-user (4).
The application software deployed at both the front-end and
back-end instances is backed by a cloud storage device that
provides persistent storage of the application data (5)
42