Professional Documents
Culture Documents
Unit3 Cloud Architecture
Unit3 Cloud Architecture
• The machines that are installed in order to run services in cloud. These are platform instances in
Virtual Appliances
particular that can be provisioned to cloud users.
• Common XML based set of protocols used as the messaging format are the Simple Object Access
Communication
Protocol (SOAP) protocol as the object model, and a set of discovery and description protocols
Protocols
based on the Web Services Description Language (WSDL) to manage transactions in cloud.
Manual Bursting
Manual bursting is a technique that lets you manually provision and de-provision cloud-based services and resources according to
notifications sent from your load balancer.
Organizations leverage manual bursting to create large, but temporary cloud deployments to meet a required work. Once the cloud
deployment is no longer needed, it is destroyed, to reduce costs.
Automated Bursting
Automated bursting enables you to set up policies that define how bursting is handled, and then the software performs the process.
Full automated and dynamic bursting techniques help organizations provision cloud resources and services on-demand, deploying when
needed and immediately de-provisioning cloud resources when traffic demands are met sufficiently or fall.
Which Apps Work Well in a Cloud Bursting Architecture?
A cloud bursting architecture can provide significant cost savings, increase the efficiency of operations, and improve overall
performance and productivity. However, there are certain challenges that prevent cloud bursting from being a good fit for a
wide scope of applications.
Cloud bursting is ideal for:
• Applications that mainly read data from storage, such as a content delivery system.
• Software development
• Marketing campaigns
• Big data modeling and queries
• Seasonal businesses
• Database applications using sharding to optimize performance.
• Big data analytics applications that need to quickly process large data volumes.
• Artificial Intelligence / Machine Learning (AI/ML) models that require large-scale infrastructure for model training.
Cloud bursting is not a good fit for:
• Applications that rely on low-latency write operations.
• Scientific applications using simulation.
Capacity planning
• For available resources, capacity planning seeks a
heavy demand. It determines whether the systems are
working properly, used to measure their performance,
determine the usage of patterns and predict future
demand of cloud-capacity. This also adds an expertise
planning for improvement and optimizes performance.
The goal of capacity planning is to maintain the
workload without improving the efficiency. Tuning
of performance and work optimization is not the major
target of capacity planners.
• It measures the maximum amount of task that it can
perform. The capacity planning for cloud technology
offers the systems with more enhanced capabilities
including some new challenges over a purely physical
system.
Steps in Capacity planning
• Determine the thing which is different from the present system.
• Determine the working load for different resources in the system such as CPU, RAM, network, etc.
• Load the system until it gets overloaded; & state what's requiring to uphold acceptable performance.
• Predict the future based on older statistical reports & other factors.
• Deploy resources to meet the predictions & calculations.
• Repeat step (i) through (v) as a loop.
Cloud bursting architecture
The cloud bursting architecture establishes a form of dynamic scaling that scales or
“bursts out” on-premise IT resources into a cloud whenever predefined capacity
thresholds have been reached. The corresponding cloud-based IT resources are
redundantly pre-deployed but remain inactive until cloud bursting occurs. After they are
no longer required, the cloud-based IT resources are released and the architecture
“bursts in” back to the on-premise environment.
Cloud bursting is a flexible scaling architecture that provides cloud consumers with the
option of using cloud-based IT resources only to meet higher usage demands. The
foundation of this architectural model is based on the automated scaling listener and
resource replication mechanisms.
IN OUT
The automated scaling listener determines when to redirect requests to cloud-based IT resources, and
resource replication is used to maintain synchronicity between on-premise and cloud-based IT resources
in relation to state information.
Elastic Disk Provisioning Architecture
This system uses thin-provisioning technology for the dynamic allocation of storage space, and is further
supported by runtime usage monitoring to collect accurate usage data for billing purposes
Elastic Disk Provisioning Architecture
The Cloud Security Alliance (CSA) provides audit documents, guidance and controls that
an IT organization can use to examine its cloud vendors. Third-party auditors can also use
CSA audit materials. CSA resources are considered the primary audit tools to perform and
optimize a comprehensive cloud audit.
The audit monitor mechanism is used to collect audit tracking data for networks and IT
resources in support of, or dictated by, regulatory and contractual obligations. The
figure depicts an audit monitor implemented as a monitoring agent that intercepts
“login” requests and stores the requestor’s security credentials, as well as both failed and
successful login attempts, in a log database for future audit reporting purposes.
1) A cloud service consumer requests access to
a cloud service by sending a login request
message with security credentials.
2) The audit monitor intercepts the message
3) And forwards it to the authentication
service.
4) The authentication service processes the
security credentials. A response message is
generated for the cloud service consumer, in
addition to the results from the login
attempt.
5) The audit monitor intercepts the response
message and stores the entire collected
login event details in the log database, as
per the organization’s audit policy
requirements.
6) Access has been granted, and a response is
sent back to the cloud service consumer.
Service level agreements https://www.javatpoint.com/what-is-an-sla
A Service Level Agreement (SLA) is the bond for performance negotiated between
the cloud services provider and the client. Earlier, in cloud computing all Service
Level Agreements were negotiated between a client and the service consumer.
Nowadays, with the initiation of large utility-like cloud computing providers, most
Service Level Agreements are standardized until a client becomes a large consumer
of cloud services. Service level agreements are also defined at different levels which
are mentioned below:
• Customer-based SLA
• Service-based SLA
• Multi-level SLA
Few Service Level Agreements are enforceable as contracts, but mostly are
agreements or contracts which are more along the lines of an Operating Level
Agreement (OLA) and may not have the restriction of law. It is fine to have an
attorney review the documents before making a major agreement to the cloud
service provider. Service Level Agreements usually specify some parameters which
are mentioned below:
● Availability of the Service (uptime)
● Latency or the response time
● Service components reliability
● Each party accountability
● Warranties
In any case, if a cloud service provider fails to meet the stated targets of minimums
then the provider has to pay the penalty to the cloud service consumer as per the
agreement. So, Service Level Agreements are like insurance policies in which the
corporation has to pay as per the agreements if any casualty occurs.
SLA Management System
The SLA management system mechanism represents a range of commercially
available cloud management products that provide features pertaining to the
administration, collection, storage, reporting, and runtime notification of SLA data.
An SLA management system deployment will generally include a repository used to
store and retrieve collected SLA data based on pre-defined metrics and reporting
parameters.
It will further rely on one or more SLA monitor mechanisms to collect the SLA data that
can then be made available in near-realtime to usage and administration portals to
provide ongoing feedback regarding active cloud services . The metrics monitored for
individual cloud services are aligned with the SLA guarantees in corresponding cloud
provisioning contracts.
The SLA monitor mechanism is used to specifically observe the runtime performance of cloud services to ensure that they
are fulfilling the contractual QoS requirements published in SLAs . The data collected by the SLA monitor is processed by
an SLA management system to be aggregated into SLA reporting metrics. This system can proactively repair or failover
cloud services when exception conditions occur, such as when the SLA monitor reports a cloud service as “down.”
Automated Scaling Listener
• The automated scaling listener mechanism is a service agent that monitors and tracks
communications between cloud consumers and cloud services for dynamic scaling
purposes. Automated scaling listeners are deployed within the cloud, typically near the
firewall, from where they automatically track workload status information.
The load balancer is typically located on the communication path between the IT
resources generating the workload and the IT resources performing the workload
processing. This mechanism can be designed as a transparent agent that remains hidden
from the cloud service consumers, or as a proxy component that abstracts the IT
resources performing their workload.
Benefits of Load Balancing
• Reduced downtime
• Scalable
• Redundancy
• Flexibility
• Efficiency
Fail over systems
• The failover system mechanism is used
to increase the reliability and availability
of IT resources by using established
clustering technology to provide
redundant implementations.
• A failover system is configured to
automatically switch over to a
redundant or standby IT resource
instance whenever the currently active
IT resource becomes unavailable.
• A failover system can span more than
one geographical region so that each WWW.LPU.CO.IN
location hosts one or more redundant
implementations of the same IT
resource.
Service Oriented Architecture
• The Service Oriented Architecture is an architectural design which includes collection of
services in a network which communicate with each other. The complication of each service is
not noticeable to other service. The service is a kind of operation which is well defined, self
contained that provides separate functionality such as checking customer account details,
printing bank statements etc and does not depend on the sate of other services.