What is a mechanism?
a system of parts working together in a machine; a piece of machinery.
Learning Outcomes
Understand basic concepts and terminology relating to cloud computing
Understand virtualization technology
Cloud Characteristics mentioned in Chapter 4
The following six specific characteristics are common to the majority of cloud environments:
• on-demand usage
• ubiquitous access
• multitenancy (and resource pooling)
• elasticity
• measured usage
• resiliency
Cloud Characteristics Cloud Mechanisms
On – Demand Usage Hypervisor
Virtual Server
Ready-Made Environment
Resource Replication
Remote Administration Environment
Resource Management System
SLA Management System
Billing Management System
Ubiquitous Access Logical Network Perimeter
Multi-Device Broker
Multitenancy / Resource Pooling Logical Network Perimeter
Hypervisor
Resource Replication
Resource Cluster
Resource Management System
Elasticity Hypervisor
Cloud Usage Monitor
Automated Scaling Listener
Resource Replication
Load Balancer
Resource Management System
Measured Usage Hypervisor
Cloud Usage Monitor
SLA Monitor
Pay-Per-Use Monitor
Audit Monitor
SLA Management System
Billing Management System
Resiliency Hypervisor
Resource Replication
Failover System
Resource Cluster
Remote Management System
Cloud Infrastructure Mechanisms
Chapter 7
Cloud Infrastructure Mechanisms
7.1 Logical Network Perimeter
7.2 Virtual Server
7.3 Cloud Storage Device
7.4 Cloud Usage Monitor
7.5 Resource Replication
7.6 Ready-Made Environment
7.1 Logical Network Perimeter
Logical Network Perimeter
Defined as the isolation of a network environment from the rest of a communications network, the logical network perimeter establishes a virtual network boundary that can encompass and isolate a group of related cloud-based IT resources that may be physically distributed
This mechanism can be implemented to:
isolate IT resources in a cloud from non-authorized users
isolate IT resources in a cloud from non-users
isolate IT resources in a cloud from cloud consumers
control the bandwidth that is available to isolated IT resources
Logical Network Perimeter
Logical network perimeters are typically established via network devices that supply and control the connectivity of a data center and are commonly deployed as virtualized IT environments that include:
• Virtual Firewall – An IT resource that actively filters network traffic to and from the isolated network while controlling its interactions with the Internet.
• Virtual Network – Usually acquired through VLANs, this IT resource isolates the network environment within the data center infrastructure.
7.2 Virtual Server
Virtual Server
A virtual server is a form of virtualization software that emulates a physical server. Virtual servers are used by cloud providers to share the same physical server with multiple cloud consumers by providing cloud consumers with individual virtual server instances.
Virtual Server
7.3 Cloud Storage Device
Cloud Storage Device
The cloud storage device mechanism represents storage devices that are designed specifically for cloud-based provisioning. Instances of these devices can be virtualized, similar to how physical servers can spawn virtual server images
Cloud Storage Levels
Cloud storage device mechanisms provide common logical units of data storage, such as:
• Files – Collections of data are grouped into files that are located in folders.
• Blocks – The lowest level of storage and the closest to the hardware, a block is the smallest unit of data that is still individually accessible.
• Datasets – Sets of data are organized into a table-based, delimited, or record format.
• Objects – Data and its associated metadata are organized as Web-based resources.
Network Storage Interfaces
Object Storage Interfaces
database storage interfaces
Relational Data Storage
Non-Relational Data Storage
7.4 Cloud Usage Monitor