Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Resource pooling architecture in cloud computing

25/11/2021 Client: muhammad11 Deadline: 2 Day

ITC561 Cloud Computing

Topic 4: Cloud Architecture

NOTICE: Slides are extracted from Cloud Computing: Concepts, Technology & Architecture by Thomas Erl; Ricardo Puttini; Zaigham Mahmood and other resources.

© PRENTICE HALL

1

understand and distinguish between Cloud architectures

understand and be able to prepare a design for a Cloud service that can use elements of:

load balancing

elastic disk provisioning

hypervisor clustering

dynamic failure detection

rapid provisioning

Prescribed text: Erl, Chapter 11: Fundamental Cloud Architectures

Learning Outcomes

workload distribution architecture reduces both IT resource over-utilization and under-utilization to an extent dependent upon the sophistication of the load balancing algorithms and runtime logic.

Workload Distribution Architecture

Figure 11.1 A redundant copy of Cloud Service A is implemented on Virtual Server B. The load balancer intercepts cloud service consumer requests and directs them to both Virtual Servers A and B to ensure even workload distribution.

load balancer mechanism applied in this cloud architecture:

Audit Monitor – When distributing runtime workloads, the type and geographical location of the IT resources that process the data can determine whether monitoring is necessary to fulfill legal and regulatory requirements.

• Cloud Usage Monitor – Various monitors can be involved to carry out runtime workload tracking and data processing.

• Hypervisor – Workloads between hypervisors and the virtual servers that they host may require distribution.

• Logical Network Perimeter – The logical network perimeter isolates cloud consumer network boundaries in relation to how and where workloads are distributed.

• Resource Cluster – Clustered IT resources in active/active mode are commonly used to support workload balancing between different cluster nodes.

• Resource Replication – This mechanism can generate new instances of virtualized IT resources in response to runtime workload distribution demands.

Workload Distribution Architecture

A resource pooling architecture is based on the use of one or more resource pools, in which identical IT resources are grouped and maintained by a system that automatically ensures that they remain synchronized.

Pools of physical RAM can be used in newly provisioned physical servers or to vertically scale physical servers. Dedicated pools can be created for each type of IT resource and individual pools can be grouped into a larger pool, in which case each individual pool becomes a sub-pool

Resource Pooling Architecture

Figure 11.2 A sample resource pool that is comprised of four sub-pools of CPUs, memory, cloud storage devices, and virtual network devices.

commonly pooled mechanisms can also be part of this cloud architecture:

Audit Monitor – This mechanism monitors resource pool usage to ensure compliance with privacy and regulation requirements, especially when pools contain cloud storage devices or data loaded into memory.

Cloud Usage Monitor – Various cloud usage monitors are involved in the runtime tracking and synchronization that are required by the pooled IT resources and any underlying management systems.

Hypervisor – The hypervisor mechanism is responsible for providing virtual servers with access to resource pools, in addition to hosting the virtual servers and sometimes the resource pools themselves.

Logical Network Perimeter – The logical network perimeter is used to logically organize and isolate resource pools.

Pay-Per-Use Monitor – The pay-per-use monitor collects usage and billing information on how individual cloud consumers are allocated and use IT resources from various pools.

Remote Administration System – This mechanism is commonly used to interface with backend systems and programs in order to provide resource pool administration features via a front-end portal.

Resource Management System – The resource management system mechanism supplies cloud consumers with the tools and permission management options for administering resource pools.

Resource Replication – This mechanism is used to generate new instances of IT resources for resource pools.

Resource Pooling Architecture

Figure 11.3 Pools B and C are sibling pools that are taken from the larger Pool A, which has been allocated to a cloud consumer. This is an alternative to taking the IT resources for Pool B and Pool C from a general reserve of IT resources that is shared throughout the cloud.

Figure 11.4 Nested Pools A.1 and Pool A.2 are comprised of the same IT resources as Pool A, but in

different quantities. Nested pools are typically used to provision cloud services that need

to be rapidly instantiated using the same type of IT resources with the same configuration

settings.

The dynamic scalability architecture is an architectural model based on a system of predefined scaling conditions that trigger the dynamic allocation of IT resources from resource pools.

The following types of dynamic scaling are commonly used:

Dynamic Horizontal Scaling – IT resource instances are scaled out and in to handle fluctuating workloads. The automatic scaling listener monitors requests and signals resource replication to initiate IT resource duplication, as per requirements and permissions.

Dynamic Vertical Scaling – IT resource instances are scaled up and down when there is a need to adjust the processing capacity of a single IT resource. For example, a virtual server that is being overloaded can have its memory dynamically increased or it may have a processing core added.

Dynamic Relocation – The IT resource is relocated to a host with more capacity.

For example, a database may need to be moved from a tape-based SAN storage device with 4 GB per second I/O capacity to another disk-based SAN storage device with 8 GB per second I/O capacity.

Dynamic Scalability Architecture

Dynamic Scalability mechanism applied in this cloud architecture:

Cloud Usage Monitor – Specialized cloud usage monitors can track runtime usage in response to dynamic fluctuations caused by this architecture.

Hypervisor – The hypervisor is invoked by a dynamic scalability system to create or remove virtual server instances, or to be scaled itself.

Pay-Per-Use Monitor – The pay-per-use monitor is engaged to collect usage cost information in response to the scaling of IT resources.

Dynamic Scalability Architecture

Figure 11.5 Cloud service consumers are sending requests to a cloud service (1). The automated scaling listener monitors the cloud service to determine if predefined capacity thresholds are being exceeded (2).

Figure 11.6 The number of requests coming from cloud service consumers increases (3). The workload exceeds the performance thresholds. The automated scaling listener determines the next course of action based on a predefined scaling policy (4). If the cloud service implementation is deemed eligible for additional scaling, the automated scaling listener initiates the scaling process (5).

Continue from Figure 11.5 

Figure 11.7 The automated scaling listener sends a signal to the resource replication mechanism (6),

which creates more instances of the cloud service (7). Now that the increased workload has been

accommodated, the automated scaling listener resumes monitoring and detracting and adding IT

resources, as required (8).

Continue from Figure 11.6 

The elastic resource capacity architecture is primarily related to the dynamic provisioning of virtual servers, using a system that allocates and reclaims CPUs and RAM in immediate response to the fluctuating processing requirements of hosted IT resources

Elastic resource capacity mechanism applied in this cloud architecture:

Cloud Usage Monitor – Specialized cloud usage monitors collect resource usage information on IT resources before, during, and after scaling, to help define the future processing capacity thresholds of the virtual servers.

Pay-Per-Use Monitor – The pay-per-use monitor is responsible for collecting resource usage cost information as it fluctuates with the elastic provisioning.

Resource Replication – Resource replication is used by this architectural model to generate new instances of the scaled IT resources.

Elastic Resource Capacity Architecture

Figure 11.8 Cloud service consumers are actively sending requests to a cloud service (1), which are monitored by an automated scaling listener (2). An intelligent automation engine script is deployed with workflow logic (3) that is capable of notifying the resource pool using allocation requests (4).

Figure 11.9 Cloud service consumer requests increase (5), causing the automated scaling listener to

signal the intelligent automation engine to execute the script (6). The script runs the

workflow logic that signals the hypervisor to allocate more IT resources from the resource

pools (7). The hypervisor allocates additional CPU and RAM to the virtual server, enabling

the increased workload to be handled (8).

Continue from Figure 11.8 

The service load balancing architecture can be considered a specialized variation of the workload distribution architecture that is geared specifically for scaling cloud service implementations.

Service load balancing architecture mechanism applied in this cloud architecture:

Cloud Usage Monitor – Cloud usage monitors may be involved with monitoring cloud service instances and their respective IT resource consumption levels, as well as various runtime monitoring and usage data collection tasks.

Resource Cluster – Active-active cluster groups are incorporated in this architecture to help balance workloads across different members of the cluster.

Resource Replication – The resource replication mechanism is utilized to generate cloud service implementations in support of load balancing requirements.

Service Load Balancing Architecture

Figure 11.10 The load balancer intercepts messages sent by cloud service consumers (1) and

forwards them to the virtual servers so that the workload processing is horizontally scaled (2).

Figure 11.11 Cloud service consumer requests are sent to Cloud Service A on Virtual Server A (1). The cloud service implementation includes built-in load balancing logic that is capable of distributing requests to the neighboring Cloud Service A implementations on Virtual Servers B and C (2).

The cloud bursting architecture establishes a form of dynamic scaling that scales or “bursts out” on-premise IT resources into a cloud whenever predefined capacity thresholds have been reached.

Cloud Bursting Architecture

Figure 11.12 An automated scaling listener monitors the usage of on-premise Service A, and redirects Service Consumer C’s request to Service A’s redundant implementation in the cloud (Cloud Service A) once Service A’s usage threshold has been exceeded (1). A resource replication system is used to keep state management databases synchronized (2).

The elastic disk provisioning architecture establishes a dynamic storage provisioning system that ensures that the cloud consumer is granularly billed for the exact amount of storage that it actually uses.

Cloud consumers are commonly charged for cloud-based storage space based on fixed-disk storage allocation, meaning the charges are predetermined by disk capacity and not aligned with actual data storage consumption.

Elastic disk provisioning architecture mechanism applied in this cloud architecture:

Cloud Usage Monitor – Specialized cloud usage monitors can be used to track and log storage usage fluctuations.

Resource Replication – Resource replication is part of an elastic disk provisioning system when conversion of dynamic thin-disk storage into static thick-disk storage is required.

Elastic Disk Provisioning Architecture

Figure 11.13 The cloud consumer requests a virtual server with three hard disks, each with a capacity of 150 GB (1). The virtual server is provisioned according to the elastic disk provisioning architecture, with a total of 450 GB of disk space (2). The 450 GB is allocated to the virtual server by the cloud provider (3). The cloud consumer has not installed any software yet, meaning the actual used space is currently 0 GB (4). Because the 450 GB are already allocated and reserved for the cloud consumer, it will be charged for 450 GB of disk usage as of the point of allocation (5).

Figure 11.14 The cloud consumer requests a virtual server with three hard disks, each with a capacity of 150 GB (1). The virtual server is provisioned by this architecture with a total of 450 GB of disk space (2). The 450 GB are set as the maximum disk usage that is allowed for this virtual server, although no physical disk space has been reserved or allocated yet (3). The cloud consumer has not installed any software, meaning the actual used space is currently at 0 GB (4). Because the allocated disk space is equal to the actual used space (which is currently at zero), the cloud consumer is not charged for any disk space usage (5).

Figure 11.15 A request is received from a cloud consumer, and the provisioning of a new virtual server instance begins (1). As part of the provisioning process, the hard disks are chosen as dynamic or thin-provisioned disks (2). The hypervisor calls a dynamic disk allocation component to create thin disks for the virtual server (3). Virtual server disks are created via the thin-provisioning program and saved in a folder of near-zero size. The size of this folder and its files grow as operating applications are installed and additional files are copied onto the virtual server (4). The pay-per-use monitor tracks the actual dynamically allocated storage for billing purposes (5).

The redundant storage architecture introduces a secondary duplicate cloud storage device as part of a failover system that synchronizes its data with the data in the primary cloud storage device.

Redundant Storage Architecture

Figure 11.16 The primary cloud storage device is routinely replicated to the secondary cloud storage device (1).

Figure 11.17 The primary storage becomes unavailable and the storage service gateway forwards the cloud consumer requests to the secondary storage device (2). The secondary storage device forwards the requests to the LUNs, allowing cloud consumers to continue to access their data (3).

Figure 11.18 Storage replication is used to keep the redundant storage device synchronized with the primary storage device.

Break and go for Topic 4 – Chapter 12: Advanced Cloud Architectures

Next?

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Master
Unique Academic Solutions
A Grade Exams
University Coursework Help
Innovative Writer
Pro Writer
Writer Writer Name Offer Chat
Finance Master

ONLINE

Finance Master

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$49 Chat With Writer
Unique Academic Solutions

ONLINE

Unique Academic Solutions

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$16 Chat With Writer
A Grade Exams

ONLINE

A Grade Exams

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$32 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$49 Chat With Writer
Innovative Writer

ONLINE

Innovative Writer

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$22 Chat With Writer
Pro Writer

ONLINE

Pro Writer

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$27 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Special population interview bshs 345 - Queen latifah strayer speech - Knowing Your Users Assignment - Art history research paper thesis example - Dq response - Lyrics black eyed peas where is the love - Experiment 2: bacterial transfer to a stab tube and an agar plate - Furse surge protection unit - Brunswick car park london - Kguard security system setup guide - 747 bus route map - Rights and responsibilities of journalists chapter 2 - Accounting and finance personal statement - Athlean x ultimate arms free - 6 4 1 worksheet part 2 - Can water conduct electricity - The gilda stories chapter 2 summary - Bbc news school holidays - Gre reading comprehension strategies - Essendon football theme song - Short essay - Tkam chapter 18 summary - Porsche kettle and toaster - Water can kill exploring effects of osmosis answer key - Terminate end event bpmn - 6 th E D IT IO N 6 th E D IT IO N BUSINESS LAW BUSINESS LAW INTRODUCTION TO INTRODUCTION TO SE / Beatty/Samuelson/Abril / Intro to Business Law, 6e ISBN-13: 9781337404341 ©2019 Designer: Stratton Design Text & Cover printer: Quad Graphics Binding: PB Trim: 8.5” x 10” CMYK IN TR O D U C TIO N TO BU SIN ESS LAW 6th EDITION To register or access your online learning solution or purchase materials for your course, visit www.cengagebrain.com. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 CengageBrain.com is the smart move when it comes to getting the right stuff on time, every time. Whether you rent or buy, we’ll save you time, money, and frustration. You’ve Got Options: Convenient digital solutions and textbooks the way you want them — to buy or rent. You Get Access: Anytime, anywhere access of digital products, eBooks, and eChapters, on your desktop, laptop, or phone. You Get Free - Claritas free zip code lookup - Order # 11058 - Henry molaison case study - Nasa's valkyrie humanoid project - Fetch decode execute cycle diagram - FIN/571: Corporate Finance - 2 pages question - Engineering stress strain curve for copper - Penn foster exam 700151 - End of probation review sample - When will qin shi huang tomb be opened - Essay INR - Aristotle nicomachean ethics second edition pdf - Pros and cons of external growth - Usyd business school assignment submission - Understanding social work sage publications - Code of conduct acs - Iec 61000 3 13 - Sbar training scenarios - Classes of stock outstanding of coca cola - Secondary markets are important because - Why do pyramid schemes fail - Data structures abstraction and design using java 2nd edition solutions - E portfolio format rasmussen - According to psychoanalytic therapy human beings are - How to recover from emergency loan capsim - Ol 211 final project milestone two - Bill nye waves worksheet doc - Drakkar noir myer - Assignment 2 block business letter - Iphones made in china sweatshops - Signature Assignment: Smart Parking Space App Presentation - Strategically thinking, why might management opt for other than the most economical choice? - Echtgeld online Casino Spiele – welche Vorteile haben Sie? - Ethics discovering right and wrong 6th edition pdf - What is cyclical menu - Short essay on Human Resource management - Similarities of egypt and philippines - Creswell 2009 pdf - Diabetic ketoacidosis concept map - Death of jonathan sanders - What does literature offer an individual - 408 890 7346 - If he hollers let him go summary sparknotes - A capacity cushion is the amount of capacity less than expected demand. - Cultural genogram symbols - 2014 pearson education inc biology - Indian education sherman alexie rhetorical analysis - Ucl student accommodation online services - How does a bond's rating affect its price - Unit 2 Discussion - Castle bromwich infant school - 2017 chemistry exam report - Electroslag welding vs submerged arc welding - Is liz claiborne a devil worshipper - Mining qualifications authority mqa - Business plan vs business proposal - How to control light intensity in an experiment - Theme for english b poem - How to annotate a sonnet - Instantaneous rate of reaction chemistry - Https www youtube com watch v yr5cjyokvus - Blooms Taxonomy - The last stop brian cable analysis - Blockhead the life of fibonacci - Teeth arrangement in complete denture - Psychiatric notes - Tic tac toe synonym - Assessment 2 – Cost and Quality Management Plans (2 parts) - Linda moulton howe age - The raw materials inventory account is a subsidiary account - The great wall of china worksheet answers - Attorney billable hours chart - Reflection of a bollywood film and 2 readings