cloud computing
cloud computing
End-user (desktop)virtualization
Virtualization of end-user computing environments End-user (desktop) virtualization
include
• VMware Player, VMware ACE, and VMware ThinApp.
– VMware Player is a reduced version of VMware Workstation
that allows creating and playing virtual machines in a
Windows or Linux operating environment.
– VMware ACE, a similar product to VMware Workstation,
creates policy-wrapped virtual machines for deploying secure
corporate virtual environments on end-user computers.
– VMware ThinApp is a solution for application
virtualization. It provides an isolated environment for
applications in order to avoid conflicts due to versioning and
incompatible applications.
Server virtualization
• VMware GSX server,
– Replicates the approach used for end-user
computers
– Remote management and scripting capabilities.
– Serve the virtualization of Web servers.
– A daemon process, called serverd, controls and
manages VMware application processes.
– These applications are then connected to the virtual machine
instances by means of the VMware driver installed on the
host operating system.
– Virtual machine instances are managed by the VMM
– User requests for virtual machine management and
provisioning are routed from the Web server through the VMM
by means of serverd.
– The scheduling is controlled by policies that areset by the • There are three fundamental components:
parent partition. – VMBus : implements the channel and defines the protocol
• Address manager. for communication between partitions.
– Manage the virtual network addresses that are – Virtual Service Providers (VSPs) : VSPs are kernel-level
drivers that are deployed in the parent partition and provide
allocated to each guest operating system. access to the corresponding hardware devices.
• Partition manager. – Virtual Service Clients (VSCs) : represent the virtual device
– Performs partition creation, finalization, drivers (also called synthetic drivers) seen by the guest
operating systems in the child partitions.
destruction, enumeration, and configurations.
Module 4
• Polling Agent
• Case Study Example
– Resource Replication
• Case Study Example
– Readymade Environment
• Problem :
– Portability: Non-relational storage mechanismsare proprietary
and so limit data portability.
cloud storage device based onan object storage interface
Cloud Storage Device… • A company provides cloud consumers access to a cloud storage
device based on an object storage interface
(2)The usage and administration portal interact with the cloud storage software to create
the cloud storage device instance and apply access policy to its data objects
Cloud storage device based on Cloud storage devices via a
an object storage interface block storage network interface
(1) The cloud consumer interacts with the usage and • A company offers a cloud service thatenables the creation of cloud
administration portal to create a cloud storage device and storage devices via a block storage network interface
define access control policies.
(2) The usage and administration portal interact with the cloud
storage software to create the cloud storage device instance and
apply the required access policy to its data objects.
– Each data object is assigned to a cloud storage device and all
of the data objects are stored in the same virtual storage
volume.
(3) The cloud consumer uses the proprietary cloud storage
device UI to interact directly with the data objects.
• Access control
– Granted on a per-object basis
– Separate access policies are used for creating, reading
from, and writing to each data object.
– Only read-only access is given for Public access
• The total usage, Utotal, for each virtual server during the
measurement period is calculated using the following resource
usageevent log database equations:
– For each VM_TYPE and VM_ID in the log
database:
Resource Replication
The virtual server becomes unavailable in Data Center A. The VIM in Data
Center B detects the failure condition and starts to reallocate the
highavailability server from Data Center A to Data Center B.
Resource Replication
Ready-Made Environment
Ready-Made Environment Other Use Cases
The development and deployment environment of partnumber catalog
application
Library Management System:
• The developer uses the provided SDK to develop the Part Front-end: Users can search for books, manage their
Number Catalog Web application (1). accounts, and request holds or renewals.
• The application software is deployed on a Web platform that was Back-end: Handles complex queries based on author, genre, or
established by two ready-made environments called the frontend
availability. Manages user accounts, loan periods, and overdue
instance (2a) and the back-end instance (2b).
• The application is made available for usage and one end-user fines. Integrates with barcode scanners and other library
accesses its front-end instance (3). management systems.
• The software running in the front-end instance invokes a
long-running task at the back-end instance that corresponds E-commerce Platform:
to the processing required by the end-user (4). Front-end: Users can browse products, add items to cart,
• The application software deployed at both the front-end and back- and checkout securely.
end instances is backed by a cloud storage device that provides
persistent storage of the application data (5). Back-end: Handles product information, inventory management,
and order processing. Integrates with payment gateways and
fulfillment centers. Recommends similar products and displays
personalized promotions.
performance and customer trends. Integrates with email
Other Use Cases …
Ready-Made Environment marketing and other communication tools.
• https://www.intellinetsystem.com/int eli-catalogue-oem.htm
Ready-Made Environment
Ready-Made Environment
Ready-Made Environment
Load Balancer
A load balancer implemented as a service agent transparently
Load Balancer distributes incoming workload request messages across two
redundant cloud service implementations, which in turn
• Balance a workload across two or more IT resources to increase maximizes performance for the cloud service consumers.
performance and capacity beyond what a single IT resource can
provide.
• Runtime agent, Does Horizontal scaling
• Exists on the communication path between the IT resources
generating the workload and the IT resources performing the
workload processing
• Load Balancer functions are
1. Asymmetric Distribution
• larger workloads are issued to IT resources with higher
processing
capacities
2. Workload Prioritization
• workloads are scheduled, queued, discarded, and
distributed workloads
according to their priority levels
3. Content-Aware Distribution
• requests are distributed to different IT
resources as dictated by the
request content
Load Balancer
SLA Monitor
SLA Monitor Case Study Example
• The standard SLA for virtual servers in a company’s leasing
• The SLA monitor polls the cloud service by sending over agreements defines a minimum IT resource availability of
polling request messages (MREQ1 to MREQN). 99.95%, which is tracked using two SLA monitors: 1) one based
• The monitor receives polling response messages (MREP1 to on a polling agent 2) Another based on a monitoring agent
MREPN) that report that the service was “up” at each polling
cycle (1a). • SLA Monitor Polling Agent
• The SLA monitor stores the “up” time—time period of all – Runs in the external perimeter network to detect physical
polling cycles 1 to N—in the log database (1b). server
• The SLA monitor polls the cloud service that sends polling timeouts.
request messages (MREQN+1 to MREQN+M). Polling response
messages are not received (2a). – Can identify data center network, hardware, and
• The response messages continue to time out, so the SLA monitor software failures that result in physical server non-
stores the “down” time—time period of all polling cycles N+1 to responsiveness.
N+M—in the log database (2b). – After three consecutive timeouts of 20-second polling periods
• The SLA monitor sends a polling request message an IT
(MREQN+M+1) resource is declared as unavailable
and receives the polling response message (MREPN+M+1) (3a).
• The SLA monitor stores the “up” time in the log database (3b). Three types of events are generated:
– PS_Timeout
SLA Monitor SLA Monitor
• the physical server polling has timed out Case Study Example …
– PS_Unreachable – the physical server polling has
consecutively SLA Monitoring Agent
timed out three times • Event-driven API
– PS_Reachable – the previously unavailable physical server • Generates three events:
becomes responsive to polling again – VM_Unreachable – the VIM cannot reach the VM
– VM_Failure – the VM has failed and is unavailable
– VM_Reachable – the VM is reachable
• The events are
– Generated by the agents have timestamps
– Logged into an SLA event log database
– Used by the SLA management system to calculate IT
resource availability.
the steps taken by SLA monitors during a data center network failure and recovery.
SLA Monitor the steps taken by SLA monitors during a data center network failure and recovery.
SLA Monitor
At timestamp = t1, a
firewall cluster has
failed and all of the IT
resources in the data
center become
unavailable (1).
the steps taken by SLA monitors during a data center network failure and recovery.
SLA Monitor the steps taken by SLA monitors during a data center network failure and recovery.
SLA Monitor
The SLA monitor polling
agent stops receiving
responses from physical
servers and starts to issue
PS_timeout events (2).
The SLA monitor polling
agent starts issuing
PS_unreachable events
after three successive
PS_timeout events.
The timestamp is now t2
(3).
the steps taken by SLA monitors during a data center network failure and recovery.
SLA Monitor the steps taken by SLA monitors during a data center network failure and recovery.
SLA Monitor
Case Study - 2
SLA Monitor
• The steps that are taken by the SLA monitors during the
failure and subsequent recovery of a physical server that is
Case Study Example …
hosting three virtual servers (VM1, VM2, VM3).
At timestamp = t1, the physical host server has failed and becomes unavailable (1).
The SLA monitor polling The SLA monitoring agent At timestamp = t2, the
agent stops receiving captures a VM_unreachable event The SLA monitor SLA monitoring agent
responses from the host that is generated for each virtual polling agent starts to captures a VM_failure event
server and issues server in the failed host server issue PS_unreachable that is generated for each of
PS_timeout events (2b). (2a) events after three the failed host server’s three
successive PS_timeout virtual servers (3a).
events at timestamp =
t3 (3b).
The steps that are taken by the SLA monitors during the failure and
subsequent recovery of a physical server that is
hosting three virtual servers (VM1, VM2, VM3) ….
• VM_Unreachable – the VIM cannot reach the VM
• VM Failure – the VM has failed and is unavailable
The host server becomes operational at timestamp = t4 (4).
• VM_Reachable – the VM is reachable
t5
5b
5a
SLA Monitor
A pay-per-use monitor designed as a monitoring agent Pay-Per-Use Monitor A pay-per-use monitor designed as a monitoring agent Pay-Per-Use Monitor
Monitoring Agent Monitoring Agent
Intermediary, event-driven program; Existing on communication paths; Transparently monitors Intermediary, event-driven program; Existing on communication paths; Transparently monitors
and analyzes dataflows; Measures network traffic and message metrics. and analyzes dataflows; Measures network traffic and message metrics.
Audit Monitor
Audit Monitor Case Study Example
• A cloud service consumer requests access to a cloud service • A key feature of Innovartus’ role-playing solution is its unique
by userinterface.
sending a login request message with security credentials (1). • However, the advanced technologies used for its design have
• The audit monitor intercepts the message (2) and forwards it to imposed licensing restrictions that legally prevent Innovartus
the from charging users in certain geographical regions for usage
authentication service (3). of the solution.
• The authentication service processes the security credentials. • Innovartus’ legal department is working on getting these issues
• A response message is generated for the cloud service consumer, in resolved.
addition to the results from the login attempt (4). • But in the meantime, it has provided the IT department with a
• The audit monitor intercepts the response message and stores the list of countries in which the application can either not be
entire collected login event details in the log database, as per the accessed by users or in which user access needs to be free of
organization’s audit policy requirements (5). charge.
• Access has been granted, and a response is sent back to the • In order to collect information about the origin of clients
cloud accessing the application, Innovartus asks its cloud provider to
service consumer (6). establish an audit monitoring system.
• The cloud provider deploys an audit monitoring agent to
Audit Monitor Audit Monitor
intercept each inbound message, analyze its corresponding
HTTP header, and collect details about the origin of the end- Case Study Example …
user.
• As per Innovartus’ request, the cloud provider further adds a
log database to collect the regional data of each end-user
request for future reporting purposes.
• Innovartus further upgrades its application so that end-users
from select countries are able to access the application at no
charge
Active-Active
The failed Cloud Service A implementation is recovered or replicated
into an operational cloud service. The failover system now
commands the load balancer to distribute the workload again.
Failover System … Active-Passive
The failover system monitors the operational status of Cloud
Service A. The Cloud Service A implementation acting as the
2. Active-Passive active instance is receiving cloud service consumer requests.
– A standby or inactive implementation isactivated to take over
the processing from the IT resource that becomes
unavailable,
– The corresponding workload is redirected to the instance
taking over the operation
Active-Passive
The Cloud Service A implementation acting as the active instance Active-Passive
The failed Cloud Service A implementation is recovered or
encounters a failure that is detected by the failover system, which
replicated an operational cloud service, and is now positioned as
subsequently activates the inactive Cloud Service A
the standby instance, while the previously invoked Cloud Service
implementation and redirects the workload toward it. The newly
A continues to serve as the active instance.
invoked Cloud Service A implementation now assumes the role of
active instance.
Failover System …
Hypervisor
Case Study Example
Hypervisor
Resource Cluster
Resource Cluster Types
Resource Cluster
• Server Cluster
• Resource cluster architectures rely on high-speed dedicated – Physical or virtual servers are clustered to increase
network connections, or cluster nodes, between IT resource performance and availability.
instances to communicate about – Virtual servers are able to live migrate from one to another
– workload distribution,
• Database Cluster
– task scheduling,
– data sharing, – Designed to improve data availability
– system synchronization. – Synchronization feature maintains the consistency of
• cluster management platform is data being stored at different storage devices used in the
– A distributed middleware runs in all of the cluster nodes cluster.
– Responsible for workload distribution, task scheduling, • Large Dataset Cluster
data sharing, system synchronization
– Data partitioning and distribution is implemented so thatthe
– coordination function: allows distributed IT resources to
appear as one IT resource, target datasets can be efficiently partitioned without
– Executes IT resources inside the cluster. compromising data integrity or computing accuracy.
Resource Cluster
Load balancing and resource replication are implemented
through a cluster-enabled hypervisor. A dedicated storage area
network is used to connect the clustered storage and the clustered
servers, which are able to share common cloud storage devices. This
simplifies the storage replication process, which is independently
carried out at the storage cluster.
Multi-Device Broker
A multi-device broker contains the mapping logic necessary to transform data exchanges • Multi-device brokers commonly exist as gateways or
between a cloud service and different typesof cloud service consumer devices.This scenario incorporate gatewaycomponents, such as:
depicts the multi- device broker as a cloud service with its own API.This mechanism canalso 1. XML Gateway – transmits and validates XML data
be implemented as a service agent that intercepts messages at runtime to perform
2. Cloud Storage Gateway – transforms cloud storage protocols
necessary transformations.
and encodes storage devices to facilitate data transfer and
storage
3. Mobile Device Gateway – transforms the communication
protocols used by mobile devices into protocols that are
compatible with a cloud service
• The levels at which transformation logic can be created Case Study Example
include: • Innovartus has decided to make its role-playing application
available to various mobile and smartphone devices. A
– transport protocols complication that hindered Innovartus’ development team
– messaging protocols during the mobile enhancement design stage was the difficulty
in reproducing identical user experiences across different mobile
– storage device protocols platforms. To resolve this issue, Innovartus implements a multi-
– data schemas/data models device broker to intercept incoming messages from devices,
identify the software platform, and convert the message format
• A multi-device broker may contain mapping logic that coverts into the native, server-side application format.
both transport and messaging protocols for a cloud service
consumer accessing a cloud service with a mobile device.
Case Study Example
The multi-device broker intercepts incoming messages and detects the platform (Web
browser, iOS, Android) of the source device (1).
The multidevice broker transforms the message into the standard format required by
the Innovartus cloud service (2).
The cloud service processes the request and responds using the same standard format
(3).
The multi-device broker transforms the response message into the format required bythe
source device and delivers the message (4).
By deferring state data to a state repository, the cloud service is able to transition to a
stateless condition (or a partially stateless condition), thereby temporarily freeing
system resources.
State Management DatabaseCase
Study Example …
State Management Database
The cloud consumer accesses the ready-made environment and requires three virtual
servers to perform all activities (1).
The cloud consumer pauses activity. All of the state data needs to be preserved for
future access to the ready-made environment (2).
The underlying infrastructure is automatically scaled in by reducing the number of
virtual servers.
State data is saved in the state management database and one virtual server remains
active to allow for future logins by the cloud consumer (3).
State Management Database
Case Study Example …
• The cloud consumer accesses the ready-made environment
and requires three virtual servers to perform all activities (1).
• The cloud consumer pauses activity. All of the state data
needs to be preserved for future access to the ready-made
environment (2).
• The underlying infrastructure is automatically scaled in by
At a later point, the cloud consumer logs in and accesses the ready-made environment reducing the number of virtual servers.
to continue activity (4). • State data is saved in the state management database and
The underlying infrastructure is automatically scaled out by increasing the number of one virtual server remains active to allow for future logins by
the cloud consumer (3).
virtual servers and by retrieving the statedata from the state management database
• At a later point, the cloud consumer logs in and accesses the
(5). ready-made environment to continue activity (4).
• The underlying infrastructure is automatically scaled out by
increasing the number of virtual servers and by retrieving the
state data from the state management database (5).
Module 5
Module 5
Cloud Management Mechanisms
new
Remote Administration System … Remote Administration System …
• Tasks that are typically automated and implemented • Resource management system functions can be accessed by
through the resource management system include: cloud resource administrators employed by the cloud provider
– Managing virtual IT resource templates that are used to create or cloud consumer.
pre-built instances, such as virtual server images – Cloud resource administrators employed by the cloud
– Allocating and releasing virtual IT resources into the provider can access the resource management system’s
available physical infrastructure in response to the native console.
starting, pausing, resuming, and termination of virtual IT
resource instances – Cloud resource administrators employed by the cloud
– Coordinating IT resources in relation to the involvement of consumer can access usage and administration portals
other mechanisms, such as resource replication, load balancer, built using APIs of Resource management systems .
and failover system
– Enforcing usage and security policies throughout the
lifecycle of cloud service instances
– Monitoring operational conditions of IT resources
Resource Management System Resource Management System
The cloud consumer’s cloud resource administrator accesses a usage and administration
portal externally to administer a leased IT resource(1).
The cloud provider’s cloud resource administrator uses the nativeuser-interface
provided by the VIM to perform internal resource management tasks (2).
The DTGOV resource management system is an extension of a The DTGOV resource management system is an extension of a
new VIM product it purchased, and provides the following new VIM product it purchased, and provides the following
primary features ….
primary features:
• An API for the creation and management of virtual servers
– Management of virtual IT resources with a flexible allocation and virtual storage devices
of pooled IT resources across different datacenters • An API for the creation of network access control rules
– Management of cloud consumer databases • An API for the up-down scaling of virtual IT resources
• An API for the migration and replication of virtual IT
– Isolation of virtual IT resources at logical perimeter resources across multiple data centers
networks • Interoperation with a single sign-on mechanism through an
– Management of a template virtual server image inventory LDAP (lightweight directory access protocol) interface
available for immediate instantiation • Custom-designed SNMP (simple network management
protocol) command scripts are further implemented to
– Automated replication (“snapshotting”) of virtual server interoperate with the network management tools to establish
images for virtual server creation isolated virtual networks across multiple data centers.
– Automated up-down scaling of virtual servers according to
usage thresholds to enable live VM migration among
physical servers
SLA Management System SLA Management System
• Provides features like administration, collection, storage, • An SLA management system has
reporting, and runtime notification of SLA data – A repository used to store and retrieve collected
SLA data
• An SLA management system has
• Done based on pre-defined metrics and reporting
– An SLA manager parameters.
– A QoS measurements repository. – One or more SLA monitor mechanisms
• To collect the SLA data that can then be made
available in near-real time to usage and administration
portals to provide on-going feedback regarding active
cloud services.
• The metrics monitored for individual cloud services are aligned
with the SLA guaranteesin corresponding cloud provisioning
contracts.