Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Resource pooling architecture in cloud computing

17/03/2021 Client: saad24vbs Deadline: 2 Day

1

ITC561 Cloud Computing

Topic 4: Cloud Architecture

NOTICE: Slides are extracted from Cloud Computing: Concepts, Technology & Architecture by Thomas Erl; Ricardo Puttini; Zaigham Mahmood and other resources.

© PRENTICE HALL

1

understand and distinguish between Cloud architectures

understand and be able to prepare a design for a Cloud service that can use elements of:

load balancing

elastic disk provisioning

hypervisor clustering

dynamic failure detection

rapid provisioning

Prescribed text: Erl, Chapter 11: Fundamental Cloud Architectures

Learning Outcomes

workload distribution architecture reduces both IT resource over-utilization and under-utilization to an extent dependent upon the sophistication of the load balancing algorithms and runtime logic.

Workload Distribution Architecture

Figure 11.1 A redundant copy of Cloud Service A is implemented on Virtual Server B. The load balancer intercepts cloud service consumer requests and directs them to both Virtual Servers A and B to ensure even workload distribution.

load balancer mechanism applied in this cloud architecture:

Audit Monitor – When distributing runtime workloads, the type and geographical location of the IT resources that process the data can determine whether monitoring is necessary to fulfill legal and regulatory requirements.

• Cloud Usage Monitor – Various monitors can be involved to carry out runtime workload tracking and data processing.

• Hypervisor – Workloads between hypervisors and the virtual servers that they host may require distribution.

• Logical Network Perimeter – The logical network perimeter isolates cloud consumer network boundaries in relation to how and where workloads are distributed.

• Resource Cluster – Clustered IT resources in active/active mode are commonly used to support workload balancing between different cluster nodes.

• Resource Replication – This mechanism can generate new instances of virtualized IT resources in response to runtime workload distribution demands.

Workload Distribution Architecture

A resource pooling architecture is based on the use of one or more resource pools, in which identical IT resources are grouped and maintained by a system that automatically ensures that they remain synchronized.

Pools of physical RAM can be used in newly provisioned physical servers or to vertically scale physical servers. Dedicated pools can be created for each type of IT resource and individual pools can be grouped into a larger pool, in which case each individual pool becomes a sub-pool

Resource Pooling Architecture

Figure 11.2 A sample resource pool that is comprised of four sub-pools of CPUs, memory, cloud storage devices, and virtual network devices.

commonly pooled mechanisms can also be part of this cloud architecture:

Audit Monitor – This mechanism monitors resource pool usage to ensure compliance with privacy and regulation requirements, especially when pools contain cloud storage devices or data loaded into memory.

Cloud Usage Monitor – Various cloud usage monitors are involved in the runtime tracking and synchronization that are required by the pooled IT resources and any underlying management systems.

Hypervisor – The hypervisor mechanism is responsible for providing virtual servers with access to resource pools, in addition to hosting the virtual servers and sometimes the resource pools themselves.

Logical Network Perimeter – The logical network perimeter is used to logically organize and isolate resource pools.

Pay-Per-Use Monitor – The pay-per-use monitor collects usage and billing information on how individual cloud consumers are allocated and use IT resources from various pools.

Remote Administration System – This mechanism is commonly used to interface with backend systems and programs in order to provide resource pool administration features via a front-end portal.

Resource Management System – The resource management system mechanism supplies cloud consumers with the tools and permission management options for administering resource pools.

Resource Replication – This mechanism is used to generate new instances of IT resources for resource pools.

Resource Pooling Architecture

Figure 11.3 Pools B and C are sibling pools that are taken from the larger Pool A, which has been allocated to a cloud consumer. This is an alternative to taking the IT resources for Pool B and Pool C from a general reserve of IT resources that is shared throughout the cloud.

Figure 11.4 Nested Pools A.1 and Pool A.2 are comprised of the same IT resources as Pool A, but in

different quantities. Nested pools are typically used to provision cloud services that need

to be rapidly instantiated using the same type of IT resources with the same configuration

settings.

The dynamic scalability architecture is an architectural model based on a system of predefined scaling conditions that trigger the dynamic allocation of IT resources from resource pools.

The following types of dynamic scaling are commonly used:

Dynamic Horizontal Scaling – IT resource instances are scaled out and in to handle fluctuating workloads. The automatic scaling listener monitors requests and signals resource replication to initiate IT resource duplication, as per requirements and permissions.

Dynamic Vertical Scaling – IT resource instances are scaled up and down when there is a need to adjust the processing capacity of a single IT resource. For example, a virtual server that is being overloaded can have its memory dynamically increased or it may have a processing core added.

Dynamic Relocation – The IT resource is relocated to a host with more capacity.

For example, a database may need to be moved from a tape-based SAN storage device with 4 GB per second I/O capacity to another disk-based SAN storage device with 8 GB per second I/O capacity.

Dynamic Scalability Architecture

Dynamic Scalability mechanism applied in this cloud architecture:

Cloud Usage Monitor – Specialized cloud usage monitors can track runtime usage in response to dynamic fluctuations caused by this architecture.

Hypervisor – The hypervisor is invoked by a dynamic scalability system to create or remove virtual server instances, or to be scaled itself.

Pay-Per-Use Monitor – The pay-per-use monitor is engaged to collect usage cost information in response to the scaling of IT resources.

Dynamic Scalability Architecture

Figure 11.5 Cloud service consumers are sending requests to a cloud service (1). The automated scaling listener monitors the cloud service to determine if predefined capacity thresholds are being exceeded (2).

Figure 11.6 The number of requests coming from cloud service consumers increases (3). The workload exceeds the performance thresholds. The automated scaling listener determines the next course of action based on a predefined scaling policy (4). If the cloud service implementation is deemed eligible for additional scaling, the automated scaling listener initiates the scaling process (5).

Continue from Figure 11.5 

Figure 11.7 The automated scaling listener sends a signal to the resource replication mechanism (6),

which creates more instances of the cloud service (7). Now that the increased workload has been

accommodated, the automated scaling listener resumes monitoring and detracting and adding IT

resources, as required (8).

Continue from Figure 11.6 

The elastic resource capacity architecture is primarily related to the dynamic provisioning of virtual servers, using a system that allocates and reclaims CPUs and RAM in immediate response to the fluctuating processing requirements of hosted IT resources

Elastic resource capacity mechanism applied in this cloud architecture:

Cloud Usage Monitor – Specialized cloud usage monitors collect resource usage information on IT resources before, during, and after scaling, to help define the future processing capacity thresholds of the virtual servers.

Pay-Per-Use Monitor – The pay-per-use monitor is responsible for collecting resource usage cost information as it fluctuates with the elastic provisioning.

Resource Replication – Resource replication is used by this architectural model to generate new instances of the scaled IT resources.

Elastic Resource Capacity Architecture

Figure 11.8 Cloud service consumers are actively sending requests to a cloud service (1), which are monitored by an automated scaling listener (2). An intelligent automation engine script is deployed with workflow logic (3) that is capable of notifying the resource pool using allocation requests (4).

Figure 11.9 Cloud service consumer requests increase (5), causing the automated scaling listener to

signal the intelligent automation engine to execute the script (6). The script runs the

workflow logic that signals the hypervisor to allocate more IT resources from the resource

pools (7). The hypervisor allocates additional CPU and RAM to the virtual server, enabling

the increased workload to be handled (8).

Continue from Figure 11.8 

The service load balancing architecture can be considered a specialized variation of the workload distribution architecture that is geared specifically for scaling cloud service implementations.

Service load balancing architecture mechanism applied in this cloud architecture:

Cloud Usage Monitor – Cloud usage monitors may be involved with monitoring cloud service instances and their respective IT resource consumption levels, as well as various runtime monitoring and usage data collection tasks.

Resource Cluster – Active-active cluster groups are incorporated in this architecture to help balance workloads across different members of the cluster.

Resource Replication – The resource replication mechanism is utilized to generate cloud service implementations in support of load balancing requirements.

Service Load Balancing Architecture

Figure 11.10 The load balancer intercepts messages sent by cloud service consumers (1) and

forwards them to the virtual servers so that the workload processing is horizontally scaled (2).

Figure 11.11 Cloud service consumer requests are sent to Cloud Service A on Virtual Server A (1). The cloud service implementation includes built-in load balancing logic that is capable of distributing requests to the neighboring Cloud Service A implementations on Virtual Servers B and C (2).

The cloud bursting architecture establishes a form of dynamic scaling that scales or “bursts out” on-premise IT resources into a cloud whenever predefined capacity thresholds have been reached.

Cloud Bursting Architecture

Figure 11.12 An automated scaling listener monitors the usage of on-premise Service A, and redirects Service Consumer C’s request to Service A’s redundant implementation in the cloud (Cloud Service A) once Service A’s usage threshold has been exceeded (1). A resource replication system is used to keep state management databases synchronized (2).

The elastic disk provisioning architecture establishes a dynamic storage provisioning system that ensures that the cloud consumer is granularly billed for the exact amount of storage that it actually uses.

Cloud consumers are commonly charged for cloud-based storage space based on fixed-disk storage allocation, meaning the charges are predetermined by disk capacity and not aligned with actual data storage consumption.

Elastic disk provisioning architecture mechanism applied in this cloud architecture:

Cloud Usage Monitor – Specialized cloud usage monitors can be used to track and log storage usage fluctuations.

Resource Replication – Resource replication is part of an elastic disk provisioning system when conversion of dynamic thin-disk storage into static thick-disk storage is required.

Elastic Disk Provisioning Architecture

Figure 11.13 The cloud consumer requests a virtual server with three hard disks, each with a capacity of 150 GB (1). The virtual server is provisioned according to the elastic disk provisioning architecture, with a total of 450 GB of disk space (2). The 450 GB is allocated to the virtual server by the cloud provider (3). The cloud consumer has not installed any software yet, meaning the actual used space is currently 0 GB (4). Because the 450 GB are already allocated and reserved for the cloud consumer, it will be charged for 450 GB of disk usage as of the point of allocation (5).

Figure 11.14 The cloud consumer requests a virtual server with three hard disks, each with a capacity of 150 GB (1). The virtual server is provisioned by this architecture with a total of 450 GB of disk space (2). The 450 GB are set as the maximum disk usage that is allowed for this virtual server, although no physical disk space has been reserved or allocated yet (3). The cloud consumer has not installed any software, meaning the actual used space is currently at 0 GB (4). Because the allocated disk space is equal to the actual used space (which is currently at zero), the cloud consumer is not charged for any disk space usage (5).

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Smart Accountants
Instant Homework Helper
Professional Accountant
Unique Academic Solutions
Math Specialist
Essay & Assignment Help
Writer Writer Name Offer Chat
Smart Accountants

ONLINE

Smart Accountants

Give me a chance, i will do this with my best efforts

$59 Chat With Writer
Instant Homework Helper

ONLINE

Instant Homework Helper

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$112 Chat With Writer
Professional Accountant

ONLINE

Professional Accountant

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$70 Chat With Writer
Unique Academic Solutions

ONLINE

Unique Academic Solutions

Give me a chance, i will do this with my best efforts

$69 Chat With Writer
Math Specialist

ONLINE

Math Specialist

Give me a chance, i will do this with my best efforts

$113 Chat With Writer
Essay & Assignment Help

ONLINE

Essay & Assignment Help

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$43 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Cost of marginal investment in accounts receivable - What does joe starbuck never wear while drinking coffee worksheet - Article Analysis,please add references and follow the template that I uploaded by 10/21/2020 at 4: 00 pm - Http www humanmetrics com hr jtypesresult aspx - Accounting discussion - Dennis kozlowski net worth - Roald dahl female characters - Discussion: Activities Encapsulated by Working With Data - Ben and jerry's advertising strategy - Sammy snake jolly phonics - Huws grey ellesmere port - Guide to federal pharmacy law 9th edition ebook - Webcam input or output - 1 10 dilution ratio - Cyber crisis management plan ppt - Sustainable growth rate calculator - Developing an evaluation plan gcu - Retriggerable monostable multivibrator circuit - Vibration of polyatomic molecules - Which spell causes objects to swell in size - ASSIGNMENT4091420 - Discussion - Discussion responses - Resentment prayer big book - E-Management homework - Blockbuster versus netflix - The most common clinical manifestation of portal hypertension is _____ bleeding. - Ebonite optyx skull bowling ball - Edward said on heart of darkness - What is the payback period statistic - Assignment Mini- Study Part I and Part II - Assessment for crisis intervention a triage assessment model - Amul recruitment written test - A company that has violated a human resource law - Fundamental methods of mathematical economics 4th edition solutions pdf - Technical communication mike markel pdf - My father began as a god - Unitary method lesson plan - When does hansberry visit her grandmother - Npn small signal model - Angela hong radiation oncologist - Differential analysis the key to decision making - Merchant of venice racism quotes - You can t get lost in cape town sparknotes - Inside walmart's corporate culture clash over e commerce - History assignments - John hopkins research evidence appraisal tool - Potential nursing diagnosis for schizophrenia - Which is excluded from the competencies of nurse leader - Me2u credit transfer optus - Volvo trucks penetrating the us market case analysis - Aloha oe rose ensemble - Zachistan - Workers performing similar work are paid more in some industries than others. Explain why this is so. - Ib standard level math formula booklet - 19th sunday year c - Apa report t test - Gun control powerpoint - Reply Post for 2 Different discussion post - Gu10 light fitting instructions - Write balanced equation for reaction between na2o2 and water - Discussion #3A - Initial Post : Child Abuse - New Works 10/19 - Pico question examples alarm fatigue - O level syllabus 2018 - Line of best fit least square method - Is coffee a solution or mixture - Plant assistant job description - Maplin wireless av sender - Values of a filipino family - Cs lewis reflections on the psalms pdf - Bbc world news anchors - Raptor pseudocode - Marketing strategy - Hydrogen peroxide and liver experiment temperature - Free download inside out movie 2015 - What is a marketing channel system and value network - To 247 thermal resistance - 5 elements of management - Wilson parking octagon parramatta - An academic department with five faculty members - Answer book reading power2 exercises unit 1 answers - Why did lucy punch leave the series vexed - Stealing carol ann duffy analysis - I lit a candle for you today poem - 2300 maccorkle ave se charleston wv 25396 - Met police vetting timescale - Words ending in ary - Essay - The proper quantity of safety stock is typically determined by - Experiment 17 lewis structures and molecular models answers - Bickerley green nursing home - Ethic Dilemma and the role of the ethics committee in the health care system. - Egyptian mau for sale uk - Excel capstone - Facebook thrift ppt slides - Walmart vision center whittlesey columbus ga - Need report based on submitted documents - What is the accountability of product owner during sprint 0 - Stewart road car park sheffield