SlideShare a Scribd company logo
UNIT 5 CLOUD COMPUTING ARCHITECTURE
UNIT 5 SYLLABUS
Fundamental Cloud Architectures-Workload Distribution
Architecture- Resource Pooling Architecture -Dynamic
Scalability Architecture- Elastic Resource Capacity
Architecture-Service Load Balancing Architecture-
Advanced Cloud Architectures Hypervisor Clustering
Architecture- Load Balanced Virtual Server Instances
Architecture-Non-Disruptive Service Relocation
Architecture-Zero Downtime Architecture-Cloud
Balancing Architecture-Case Study.
UNIT OUTCOME
Cloud technology architectures formalize
functional domains within cloud environments
by establishing well-defined solutions comprised
of interactions, behaviors, and distinct
combinations of cloud computing mechanisms
and other specialized cloud technology
components.
FUNDAMENTAL CLOUD
ARCHITECTURES
WORKLOAD DISTRIBUTION
ARCHITECTURE
• IT resources can be horizontally scaled via the
addition of one or more identical IT resources, and
a load balancer that provides runtime logic capable
of evenly distributing the workload among the
available IT resources.
• The resulting workload distribution architecture
reduces both IT resource overutilization and under-
utilization to an extent dependent upon the
sophistication of the load balancing algorithms and
runtime logic.
This fundamental architectural model can be applied to any IT resource, with
workload distribution commonly carried out in support of distributed virtual
servers, cloud storage devices, and cloud services.
• In addition to the base load balancer mechanism, and the virtual
server and cloud storage device mechanisms to which load
balancing can be applied, the following mechanisms can also be
part of this cloud architecture:
• Audit Monitor – When distributing runtime workloads, the type
and geographical location of the IT resources that process the
data can determine whether monitoring is necessary to fulfill
legal and regulatory requirements.
• Cloud Usage Monitor – Various monitors can be involved to
carry out runtime workload tracking and data processing.
• Hypervisor – Workloads between hypervisors and the virtual
servers that they host may require distribution.
• Logical Network Perimeter – The logical network perimeter
isolates cloud consumer network boundaries in relation to how
and where workloads are distributed.
• Resource Cluster – Clustered IT resources in
active/active mode are commonly used to support
workload balancing between different cluster nodes.
• Resource Replication – This mechanism can
generate new instances of virtualized IT resources in
response to runtime workload distribution demands.
Resource Pooling Architecture
• A Resource pooling architecture is based on the use of one or
more resource pools, in which identical IT resources are
grouped and maintained by a system that automatically ensures
that they remain synchronized.
• Dedicated pools can be created for each type of IT resource
and individual pools can be grouped into a larger pool, in
which case each individual pool becomes a sub-pool
Provided here are common examples of resource pools:
Physical server pools are composed of networked servers that
have been installed with operating systems and other necessary
programs and/or applications and are ready for immediate use.
Virtual server pools are usually configured using one of several
available templates chosen by the cloud consumer during
provisioning. For example, a cloud consumer can set up a pool of
mid-tier. Windows servers with 4 GB of RAM or a pool of low-tier
Ubuntu servers with 2 GB of RAM.
Storage pools, or cloud storage device pools, consist of file-based
or block-based storage structures that contain empty and/or filled
cloud storage devices.
Network pools (or interconnect pools) are composed of different
pre configured network connectivity devices. For example, a pool
of virtual firewall devices or physical network switches can be
created for redundant connectivity, load balancing, or link
aggregation.
CPU pools are ready to be allocated to virtual servers, and are
typically broken down into individual processing cores.
Memory pools-Pools of physical RAM can be used in newly
provisioned physical servers or to vertically scale physical
servers.
Resource pools can become highly complex, with multiple pools created for specific cloud
consumers or applications. A hierarchical structure can be established to form parent,
sibling, and nested pools in order to facilitate the organization of diverse resource pooling
requirements
In the nested pool model, larger pools are divided into smaller pools that individually
group the same type of IT resources together. Nested pools can be used to assign
resource pools to different departments or groups in the same cloud consumer
organization.
• In addition to cloud storage devices and virtual servers,
which are commonly pooled mechanisms, the following
mechanisms can also be part of this cloud architecture:
Audit Monitor
Cloud Usage Monitor
Hypervisor
Logical Network Perimeter
Pay-Per-Use Monitor
Remote Administration System
Resource Management System
Resource replication
Dynamic Scalability Architecture
• The dynamic scalability architecture is an architectural model
based on a system of predefined scaling conditions that
trigger the dynamic allocation of IT resources from resource
pools.
• The automated scaling listener is configured with workload
thresholds that dictate when new IT resources need to be
added to the workload processing.
• Dynamic allocation enables variable utilization as dictated by
usage demand fluctuations, since unnecessary IT resources
are efficiently reclaimed without requiring manual
interaction.
• Other mechanisms used in this architecture- Cloud Usage
Monitor, Hypervisor, Pay-Per-Use Monitor
The following types of dynamic scaling are commonly used:
• Dynamic Horizontal Scaling – IT resource instances are
scaled out and in to handle fluctuating workloads. The
automatic scaling listener monitors requests and signals
resource replication to initiate IT resource duplication, as
per requirements and permissions.
• Dynamic Vertical Scaling – IT resource instances are
scaled up and down when there is a need to adjust the
processing capacity of a single IT resource.
• Dynamic Relocation – The IT resource is relocated to a
host with more capacity. For example, a database may
need to be moved from a tape-based SAN storage device
with 4 GB per second I/O capacity to another disk based
SAN storage device with 8 GB per second I/O capacity
Process of Dynamic Horizontal Scaling
1
2
3
Elastic Resource Capacity Architecture
• The elastic resource capacity architecture is primarily related to the
dynamic provisioning (resources are deployed flexibly to match a
customers fluctuating demands) of virtual servers, using a system that
allocates and reclaims CPUs and RAM in immediate response to the
fluctuating processing requirements of hosted IT resources.
CLOUD COMPUTING TECHNIQUES -Unit 5 - This course will enable the students to learn the concept of cloud computing and its various issues, emergence of cloud as the next generation computing paradigm and to set up a private cloud.
CLOUD COMPUTING TECHNIQUES -Unit 5 - This course will enable the students to learn the concept of cloud computing and its various issues, emergence of cloud as the next generation computing paradigm and to set up a private cloud.
• Resource pools are used by scaling technology that
interacts with the hypervisor and/or VIM to retrieve
and return CPU and RAM resources at runtime.
• The virtual server and its hosted applications and IT
resources are vertically scaled in response.
• This type of cloud architecture can be designed so
that the intelligent automation engine script sends
its scaling request via the VIM instead of to the
hypervisor directly.
• Additional mechanisms that can be included are
Cloud Usage Monitor, Pay-Per-Use Monitor,
Resource Replication.
Service Load Balancing Architecture
• The service load balancing architecture can be
considered a specialized variation of the workload
distribution architecture that is geared specifically for
scaling cloud service implementations.
• Redundant deployments of cloud services are created,
with a load balancing system added to dynamically
distribute workloads.
• The duplicate cloud service implementations are
organized into a resource pool, while the load balancer
is positioned as either an external or built-in component
to allow the host servers to balance the workloads
themselves.
CLOUD COMPUTING TECHNIQUES -Unit 5 - This course will enable the students to learn the concept of cloud computing and its various issues, emergence of cloud as the next generation computing paradigm and to set up a private cloud.
CLOUD COMPUTING TECHNIQUES -Unit 5 - This course will enable the students to learn the concept of cloud computing and its various issues, emergence of cloud as the next generation computing paradigm and to set up a private cloud.
Ad

More Related Content

Similar to CLOUD COMPUTING TECHNIQUES -Unit 5 - This course will enable the students to learn the concept of cloud computing and its various issues, emergence of cloud as the next generation computing paradigm and to set up a private cloud. (20)

U18ISE0006 -UNIT IV - Load Balancer - AWS.pptx
U18ISE0006 -UNIT IV - Load Balancer - AWS.pptxU18ISE0006 -UNIT IV - Load Balancer - AWS.pptx
U18ISE0006 -UNIT IV - Load Balancer - AWS.pptx
AlesterDavis
 
617537294-UNIT-III-Building-Aneka clos.pptx
617537294-UNIT-III-Building-Aneka clos.pptx617537294-UNIT-III-Building-Aneka clos.pptx
617537294-UNIT-III-Building-Aneka clos.pptx
sharankongetira1
 
Cloud computing (cc) ppt, computer science
Cloud computing (cc) ppt, computer scienceCloud computing (cc) ppt, computer science
Cloud computing (cc) ppt, computer science
abishakathiresan1712
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
AngelineR
 
unit3.ppt
unit3.pptunit3.ppt
unit3.ppt
Venneladonthireddy1
 
cloud delivery model considerations are explained here
cloud delivery model considerations are explained herecloud delivery model considerations are explained here
cloud delivery model considerations are explained here
vidhyapm2
 
CC Module 5.pptx
CC Module 5.pptxCC Module 5.pptx
CC Module 5.pptx
AmmuLiki
 
Lecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptxLecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptx
UbaidURRahman78
 
ServerVirtualization.pptx
ServerVirtualization.pptxServerVirtualization.pptx
ServerVirtualization.pptx
SatyajeetGaur3
 
Cloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsCloud Delivery Model Considerations
Cloud Delivery Model Considerations
Mohammed Sajjad Ali
 
Dbms
DbmsDbms
Dbms
vatsaanadi
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computing
Shahzad
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
pkaviya
 
Cloud Bursting Architecture, Cloud Computing
Cloud Bursting Architecture, Cloud ComputingCloud Bursting Architecture, Cloud Computing
Cloud Bursting Architecture, Cloud Computing
malarrs2002
 
Automated listening (1)
Automated listening (1)Automated listening (1)
Automated listening (1)
ssuser6ff999
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
Brian Bullard
 
Types of computing
Types of computingTypes of computing
Types of computing
Priyam Pandey
 
Cloud computing_Final
Cloud computing_FinalCloud computing_Final
Cloud computing_Final
Kaushik Padmanabhan
 
storage.pptx
storage.pptxstorage.pptx
storage.pptx
mnm Lastopop
 
cloud computing notes for engineering.pptx
cloud computing notes for engineering.pptxcloud computing notes for engineering.pptx
cloud computing notes for engineering.pptx
pradeena937556
 
U18ISE0006 -UNIT IV - Load Balancer - AWS.pptx
U18ISE0006 -UNIT IV - Load Balancer - AWS.pptxU18ISE0006 -UNIT IV - Load Balancer - AWS.pptx
U18ISE0006 -UNIT IV - Load Balancer - AWS.pptx
AlesterDavis
 
617537294-UNIT-III-Building-Aneka clos.pptx
617537294-UNIT-III-Building-Aneka clos.pptx617537294-UNIT-III-Building-Aneka clos.pptx
617537294-UNIT-III-Building-Aneka clos.pptx
sharankongetira1
 
Cloud computing (cc) ppt, computer science
Cloud computing (cc) ppt, computer scienceCloud computing (cc) ppt, computer science
Cloud computing (cc) ppt, computer science
abishakathiresan1712
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
AngelineR
 
cloud delivery model considerations are explained here
cloud delivery model considerations are explained herecloud delivery model considerations are explained here
cloud delivery model considerations are explained here
vidhyapm2
 
CC Module 5.pptx
CC Module 5.pptxCC Module 5.pptx
CC Module 5.pptx
AmmuLiki
 
Lecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptxLecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptx
UbaidURRahman78
 
ServerVirtualization.pptx
ServerVirtualization.pptxServerVirtualization.pptx
ServerVirtualization.pptx
SatyajeetGaur3
 
Cloud Delivery Model Considerations
Cloud Delivery Model ConsiderationsCloud Delivery Model Considerations
Cloud Delivery Model Considerations
Mohammed Sajjad Ali
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computing
Shahzad
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
pkaviya
 
Cloud Bursting Architecture, Cloud Computing
Cloud Bursting Architecture, Cloud ComputingCloud Bursting Architecture, Cloud Computing
Cloud Bursting Architecture, Cloud Computing
malarrs2002
 
Automated listening (1)
Automated listening (1)Automated listening (1)
Automated listening (1)
ssuser6ff999
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
Brian Bullard
 
cloud computing notes for engineering.pptx
cloud computing notes for engineering.pptxcloud computing notes for engineering.pptx
cloud computing notes for engineering.pptx
pradeena937556
 

More from PreethaV16 (10)

CLOUD SECURITY MECHANSMS - Unit 4 - This course will enable the students to l...
CLOUD SECURITY MECHANSMS - Unit 4 - This course will enable the students to l...CLOUD SECURITY MECHANSMS - Unit 4 - This course will enable the students to l...
CLOUD SECURITY MECHANSMS - Unit 4 - This course will enable the students to l...
PreethaV16
 
CLOUD COMPUTING TECHNIQUES - This course will enable the students to learn th...
CLOUD COMPUTING TECHNIQUES - This course will enable the students to learn th...CLOUD COMPUTING TECHNIQUES - This course will enable the students to learn th...
CLOUD COMPUTING TECHNIQUES - This course will enable the students to learn th...
PreethaV16
 
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
PreethaV16
 
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
PreethaV16
 
Foundation Skills in Integrated Product Development
Foundation Skills in Integrated Product DevelopmentFoundation Skills in Integrated Product Development
Foundation Skills in Integrated Product Development
PreethaV16
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Object Oriented Programming using C++ - OOPS concepts using C++ programming l...
Object Oriented Programming using C++ - OOPS concepts using C++ programming l...Object Oriented Programming using C++ - OOPS concepts using C++ programming l...
Object Oriented Programming using C++ - OOPS concepts using C++ programming l...
PreethaV16
 
Software Requirements Engineering - SRE also called as Requirements Engineering
Software Requirements Engineering - SRE also called as Requirements EngineeringSoftware Requirements Engineering - SRE also called as Requirements Engineering
Software Requirements Engineering - SRE also called as Requirements Engineering
PreethaV16
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
CLOUD SECURITY MECHANSMS - Unit 4 - This course will enable the students to l...
CLOUD SECURITY MECHANSMS - Unit 4 - This course will enable the students to l...CLOUD SECURITY MECHANSMS - Unit 4 - This course will enable the students to l...
CLOUD SECURITY MECHANSMS - Unit 4 - This course will enable the students to l...
PreethaV16
 
CLOUD COMPUTING TECHNIQUES - This course will enable the students to learn th...
CLOUD COMPUTING TECHNIQUES - This course will enable the students to learn th...CLOUD COMPUTING TECHNIQUES - This course will enable the students to learn th...
CLOUD COMPUTING TECHNIQUES - This course will enable the students to learn th...
PreethaV16
 
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
PreethaV16
 
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
PreethaV16
 
Foundation Skills in Integrated Product Development
Foundation Skills in Integrated Product DevelopmentFoundation Skills in Integrated Product Development
Foundation Skills in Integrated Product Development
PreethaV16
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Object Oriented Programming using C++ - OOPS concepts using C++ programming l...
Object Oriented Programming using C++ - OOPS concepts using C++ programming l...Object Oriented Programming using C++ - OOPS concepts using C++ programming l...
Object Oriented Programming using C++ - OOPS concepts using C++ programming l...
PreethaV16
 
Software Requirements Engineering - SRE also called as Requirements Engineering
Software Requirements Engineering - SRE also called as Requirements EngineeringSoftware Requirements Engineering - SRE also called as Requirements Engineering
Software Requirements Engineering - SRE also called as Requirements Engineering
PreethaV16
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
Ad

Recently uploaded (15)

IoT PPT introduction to internet of things
IoT PPT introduction to internet of thingsIoT PPT introduction to internet of things
IoT PPT introduction to internet of things
VaishnaviPatil3995
 
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
emestica1
 
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
Taqyea
 
introduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.pptintroduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.ppt
SherifElGohary7
 
ProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptxProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptx
OlenaKotovska
 
Breaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdfBreaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdf
Internet Bundle Now
 
Paper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdfPaper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdf
Steven McGee
 
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness GuideThe Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
russellpeter1995
 
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and MonitoringPresentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
mdaoudi
 
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
werhkr1
 
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
Taqyea
 
AG-FIRMA Ai Agent for Agriculture | RAG ..
AG-FIRMA Ai Agent for Agriculture  | RAG ..AG-FIRMA Ai Agent for Agriculture  | RAG ..
AG-FIRMA Ai Agent for Agriculture | RAG ..
Anass Nabil
 
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdfGiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
Giacomo Vacca
 
Cloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptxCloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptx
marketing140789
 
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
 
IoT PPT introduction to internet of things
IoT PPT introduction to internet of thingsIoT PPT introduction to internet of things
IoT PPT introduction to internet of things
VaishnaviPatil3995
 
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
emestica1
 
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
学生卡英国RCA毕业证皇家艺术学院电子毕业证学历证书
Taqyea
 
introduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.pptintroduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.ppt
SherifElGohary7
 
ProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptxProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptx
OlenaKotovska
 
Breaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdfBreaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdf
Internet Bundle Now
 
Paper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdfPaper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdf
Steven McGee
 
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness GuideThe Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
russellpeter1995
 
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and MonitoringPresentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
mdaoudi
 
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
werhkr1
 
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本UMM学位证书
Taqyea
 
AG-FIRMA Ai Agent for Agriculture | RAG ..
AG-FIRMA Ai Agent for Agriculture  | RAG ..AG-FIRMA Ai Agent for Agriculture  | RAG ..
AG-FIRMA Ai Agent for Agriculture | RAG ..
Anass Nabil
 
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdfGiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
Giacomo Vacca
 
Cloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptxCloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptx
marketing140789
 
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
 
Ad

CLOUD COMPUTING TECHNIQUES -Unit 5 - This course will enable the students to learn the concept of cloud computing and its various issues, emergence of cloud as the next generation computing paradigm and to set up a private cloud.

  • 1. UNIT 5 CLOUD COMPUTING ARCHITECTURE
  • 2. UNIT 5 SYLLABUS Fundamental Cloud Architectures-Workload Distribution Architecture- Resource Pooling Architecture -Dynamic Scalability Architecture- Elastic Resource Capacity Architecture-Service Load Balancing Architecture- Advanced Cloud Architectures Hypervisor Clustering Architecture- Load Balanced Virtual Server Instances Architecture-Non-Disruptive Service Relocation Architecture-Zero Downtime Architecture-Cloud Balancing Architecture-Case Study.
  • 3. UNIT OUTCOME Cloud technology architectures formalize functional domains within cloud environments by establishing well-defined solutions comprised of interactions, behaviors, and distinct combinations of cloud computing mechanisms and other specialized cloud technology components.
  • 5. WORKLOAD DISTRIBUTION ARCHITECTURE • IT resources can be horizontally scaled via the addition of one or more identical IT resources, and a load balancer that provides runtime logic capable of evenly distributing the workload among the available IT resources. • The resulting workload distribution architecture reduces both IT resource overutilization and under- utilization to an extent dependent upon the sophistication of the load balancing algorithms and runtime logic.
  • 6. This fundamental architectural model can be applied to any IT resource, with workload distribution commonly carried out in support of distributed virtual servers, cloud storage devices, and cloud services.
  • 7. • In addition to the base load balancer mechanism, and the virtual server and cloud storage device mechanisms to which load balancing can be applied, the following mechanisms can also be part of this cloud architecture: • Audit Monitor – When distributing runtime workloads, the type and geographical location of the IT resources that process the data can determine whether monitoring is necessary to fulfill legal and regulatory requirements. • Cloud Usage Monitor – Various monitors can be involved to carry out runtime workload tracking and data processing. • Hypervisor – Workloads between hypervisors and the virtual servers that they host may require distribution. • Logical Network Perimeter – The logical network perimeter isolates cloud consumer network boundaries in relation to how and where workloads are distributed.
  • 8. • Resource Cluster – Clustered IT resources in active/active mode are commonly used to support workload balancing between different cluster nodes. • Resource Replication – This mechanism can generate new instances of virtualized IT resources in response to runtime workload distribution demands.
  • 9. Resource Pooling Architecture • A Resource pooling architecture is based on the use of one or more resource pools, in which identical IT resources are grouped and maintained by a system that automatically ensures that they remain synchronized. • Dedicated pools can be created for each type of IT resource and individual pools can be grouped into a larger pool, in which case each individual pool becomes a sub-pool
  • 10. Provided here are common examples of resource pools: Physical server pools are composed of networked servers that have been installed with operating systems and other necessary programs and/or applications and are ready for immediate use. Virtual server pools are usually configured using one of several available templates chosen by the cloud consumer during provisioning. For example, a cloud consumer can set up a pool of mid-tier. Windows servers with 4 GB of RAM or a pool of low-tier Ubuntu servers with 2 GB of RAM. Storage pools, or cloud storage device pools, consist of file-based or block-based storage structures that contain empty and/or filled cloud storage devices.
  • 11. Network pools (or interconnect pools) are composed of different pre configured network connectivity devices. For example, a pool of virtual firewall devices or physical network switches can be created for redundant connectivity, load balancing, or link aggregation. CPU pools are ready to be allocated to virtual servers, and are typically broken down into individual processing cores. Memory pools-Pools of physical RAM can be used in newly provisioned physical servers or to vertically scale physical servers.
  • 12. Resource pools can become highly complex, with multiple pools created for specific cloud consumers or applications. A hierarchical structure can be established to form parent, sibling, and nested pools in order to facilitate the organization of diverse resource pooling requirements
  • 13. In the nested pool model, larger pools are divided into smaller pools that individually group the same type of IT resources together. Nested pools can be used to assign resource pools to different departments or groups in the same cloud consumer organization.
  • 14. • In addition to cloud storage devices and virtual servers, which are commonly pooled mechanisms, the following mechanisms can also be part of this cloud architecture: Audit Monitor Cloud Usage Monitor Hypervisor Logical Network Perimeter Pay-Per-Use Monitor Remote Administration System Resource Management System Resource replication
  • 15. Dynamic Scalability Architecture • The dynamic scalability architecture is an architectural model based on a system of predefined scaling conditions that trigger the dynamic allocation of IT resources from resource pools. • The automated scaling listener is configured with workload thresholds that dictate when new IT resources need to be added to the workload processing. • Dynamic allocation enables variable utilization as dictated by usage demand fluctuations, since unnecessary IT resources are efficiently reclaimed without requiring manual interaction. • Other mechanisms used in this architecture- Cloud Usage Monitor, Hypervisor, Pay-Per-Use Monitor
  • 16. The following types of dynamic scaling are commonly used: • Dynamic Horizontal Scaling – IT resource instances are scaled out and in to handle fluctuating workloads. The automatic scaling listener monitors requests and signals resource replication to initiate IT resource duplication, as per requirements and permissions. • Dynamic Vertical Scaling – IT resource instances are scaled up and down when there is a need to adjust the processing capacity of a single IT resource. • Dynamic Relocation – The IT resource is relocated to a host with more capacity. For example, a database may need to be moved from a tape-based SAN storage device with 4 GB per second I/O capacity to another disk based SAN storage device with 8 GB per second I/O capacity
  • 17. Process of Dynamic Horizontal Scaling 1
  • 18. 2 3
  • 19. Elastic Resource Capacity Architecture • The elastic resource capacity architecture is primarily related to the dynamic provisioning (resources are deployed flexibly to match a customers fluctuating demands) of virtual servers, using a system that allocates and reclaims CPUs and RAM in immediate response to the fluctuating processing requirements of hosted IT resources.
  • 22. • Resource pools are used by scaling technology that interacts with the hypervisor and/or VIM to retrieve and return CPU and RAM resources at runtime. • The virtual server and its hosted applications and IT resources are vertically scaled in response. • This type of cloud architecture can be designed so that the intelligent automation engine script sends its scaling request via the VIM instead of to the hypervisor directly. • Additional mechanisms that can be included are Cloud Usage Monitor, Pay-Per-Use Monitor, Resource Replication.
  • 23. Service Load Balancing Architecture • The service load balancing architecture can be considered a specialized variation of the workload distribution architecture that is geared specifically for scaling cloud service implementations. • Redundant deployments of cloud services are created, with a load balancing system added to dynamically distribute workloads. • The duplicate cloud service implementations are organized into a resource pool, while the load balancer is positioned as either an external or built-in component to allow the host servers to balance the workloads themselves.
  翻译: