CC 1
CC 1
Business Drivers
Before đelving into the layers of technologis that undertie couds the motivations that
led to their creation by industry leaders must first be understod Several of the primary
business drivers that fostered modern cloud-based technology are presented in this
section.
2
The origins and inspirations of many of the characteristis, models, and mechanisms
covered throughout subsequent chapters can be traced back to the upcoming business
drivers. tis important to note that these influences shaped clouds and the overall cloud
computing market from both ends They have motivated organizations to adopt cloud
computing in support of their business automation requirements They have corre
spondingy motivated other organizations to become providers of cloud environments
and cloud technalogy vendors in order to create and meet the demand to fuláil cn-
sumer needs.
Capaciy Planning
Capacity planning is the process of determining and fuliling future demands of an
onganization's II resources, products, and services Within this context,. capacity rep-
resents the maximum amount of work that an IT resource is capable of delivering in
a given period of time. A discrepancy between the capacity of an IT resource and its
demand can resuil in asystem becoming ither ineficient (over provisianing) ar unable
to fulfíll user needs (under-provisioning). Capacity planning is focused on minimizing
this discrepancy to achieve predictable efficiency and performance.
Different capacity planning strategies exist:
. Lead Strategy - adding capacity to an IT resource in anticipation of demand
• Lag Stnategy - adding capacity when the IT resource reaches its full capacity
• Match Strategy - adding IT resource capacity in small increments, as demand
increases
Planning for capacity can be challenging because it requires estimating usage load fluc-
tuations. There is a constant need to balance peak usage requirements without unneces-
sary over-expenditure on infrastructure. An example is outfitting IT infrastructure to
accommodate maximum usage loads which can impose unreasonable financial invest-
ments. In such cases, moderating investments can result in under-provisioning, leading
to transaction losses and other usage limitations from lowered usage thresholds.
Cost Reduction
A direct alignment between IT costs and business performance can be difficult to main-
tain. The growth of T environments often corresponds to the assessment of their maxi-
automations an ever-increasing investment. Much of this required investment is fun-
neled into infrastructure expansion because the usage potential of a given automation
solution will always be limited by the processing power of its underlying infrastructure.
Two costs need to be accounted for: the cost of acquiring new infrastructure, and the
cost of its ongoing ownership. Operational overhead represents a considerable share of
IT budgets, often exceeding up-front investment costs
Common forms of infrastructure-related operating overhead include the following:
• technical personnel required to keep the environment operational
• upgrades and patches that introduce additional testing and deployment cycles
• utility bills and capital expense investments for power and cooling
ty and acce control measures that need to be maintained and enforced to
protect infrastructure resources
trvtue
•administrative and accounts staff that may be required to keep track of licenses
3
Virtualization
Virtualization represents a technology platform used for the creation of virtual instances
of IT resources. A layer of virtualization software allows physical T resources to pro-
vide multiple virtual images of themselves so that their undertlying processing capabili-
ties can be shared by multiple users
Prior to the advent of virtualization technologies, software was limited to residing on
and being coupled with static hardware environments. The virtualization process sev-
ers this software-hardware dependency. as hardware requirements can be simulated by
emulation software running in virtualized environments
Established virtualization technologies can be traced to several coud characteristics
and cloud computing mechanisms, having inspired many of their core features. As
cloud computing evolved., a generation of modern virtualization technologies emerged
to overcome the performance, reliability, and scalability limitations of traditional virtu-
5
Federated cloud/intercloud
Cloud Federation, also known as Federated Cloud is the deployment and management of several
external and internal cloud computing services to match business needs. It is a multinational cloud
system that integrates private, community, and public clouds into scalable computing platforms Federated
cloud is created by connecting the cloud environment of different cloud providers using a common
standard Federated Cloud
2. Cloud Co-ordinator
The cloud coordinator assigns the resources of the cloud to the remote users based on the quality of
service they demand and the credits they have in the cloud bank. The cloud enterprises and their
membership are managed by the cloud controller.
3. Cloud Broker
The cloud broker interacts with the cloud coordinator, analyzes the Service Level agreement and the
resources offered by several cloud providers in cloud exchange. Cloud broker finalizes the most suitable
deal for their client.
27
28
29
Hybrid cloud:
A hybrid cloud is a heterogeneous distributed system formed by combining facilities of the public cloud
and private cloud. For this reason, they are also called heterogeneous clouds.
A major drawback of private deployments is the inability to scale on-demand and efficiently address peak
loads. Here public clouds are needed. Hence, a hybrid cloud takes advantage of both public and private
clouds.
Community cloud:
Community clouds are distributed systems created by integrating the services of different clouds to
address th specific needs of an industry, a community, or a business sector. But sharing responsibilities
among the organizations is difficult.
In the community cloud, the infrastructure is shared between organizations that have shared concerns or
tasks An organization or a third party may manage the cloud.
Multicloud
Multicloud is the use of multiple cloud computing services from different providers, which allows
organizations to use the best-sui ted services for their specific needs and avoid vendor lockin.
This allows organizations to take advantage of the different features and capabilities offered by different
cloud providers
Advantages of using multi-cloud:
1. Flexibility: Using multiple cloud providers allows organizations to choose the best-suited services for
their specific needs, and avoid vendor lockin..
2.Cost-effectiveness: Organizations can take advan tage of the cost savings and pricing benefits offered
by different cloud providers for di fferent services3. Improved performance By distributing workloads
across multiple cloud providers, organizations can improve
30
31
32
33
34
tion layer, there are several classes of VM architectures, namely the hypervisor architecture . para-
virtualization, and host-based virtualization. The hypervisor is also known as the VMM (Virtual
Machine Monitor). They both perfon the same virtualization operations.
3.2.1 Hypervisor and Xen Architecture
The hypervisor supports hardware-level virtualization (see Figure 3.1(b)) on bare metal devices like
CPU, memory, disk and network interfaces. The hypervisor software sits directly between the physi-
cal hardware and its OS. This virtualization layer is referred to as either the VMM or the hypervisor.
The hypervisor provides hypercalls for the guest OSes and applications. Depending on the functional-
ity, a hypervisor can assume a micro-kernel architecture like the Microsoft Hyper-V. Or it can
assume a monolithic hypervisor architecture like the VMware ESX for server virtualization.
A microkernel hypervisor includes only the basic and unchanging functions (such as physical
memory management and processor scheduling). The device drivers and other changeable components
are outside the hypervisor. A monolithic hypervisor implements all the aforementioned functions,
including those of the device drivers. Therefore, the size of the hypervisor code of a micro-kemel hyper-
visor is smaller than that of a monolithic hypervisor. Essentially, a hypervisor must be able to convert
physical devices into virtual resources dedicated for the deployed VM to use.
3.2.1.1 The Xen Architecture
Xen is an open source hypervisor program developed by Cambridge University. Xen is a micro-
kernel hypervisor, which separates the policy from the mechanism. The Xen hypervisor implements
ll the mechanisms, leaving the policy to be handled by Domain 0, as shown in Figure 3.5. Xen
does not include any device drivers natively (7]. It just provides a mechanism by which a guest OS
can have direct access to the physical devices. As a result, the size of the Xen hypervisor is kept
rather small., Xen provides a virtual environment located between the hardware and the OS.
A number of vendors are in the process of developing commercial Xen hypervisors, among them
are Citrix XenServer (62] and Oracle VM J421.
The core components of a Xen system are the hypervisor, kemel, and applications. The organi-
zation of the three components is important. Like other virtualization systems, many guest OSes
can run on top of the hypervisor. However, not all guest OSes are created equal, and one in
process-level virtualization. The most popular approach is to deploy high level language (HLL)
VMs. In this scenario, the virtualization layer sits as an application program on top of the operating
system, and the layer exports an abstraction of a VM that can run programs written and compiled
to a particular abstract machine definition. Any program written in the HILL. and compiled for this
VM will be able to run on it. The Microsoft NET CLR and Java Virtual Machine (JVM) are two
good examples of this class of VM.
Other forms of application-level virtualization are known as application isolation, application
sandboxing, or application streaming. The process involves wrapping the agplication in a layer that
is isolated from the host 0S and other applications. The result is an application that is much easier
to distribute and remove from user workstations. An example is the LANDesk application viruali-
zation platform which deploys software applications as self contained, executable files in an isolatcd
environment without requiring installation, system modifications, or elevated security privileges.
31.16 Relative Merits of Different Approaches
Table 3.1 compares the relative merits of implementing virtualization at various levels. The column
headings correspond to four technical merits. "Higher Performance" and "Application Flexibility"
are self
explanatory. "implementation Complexity" implies the cost to implement that particular vir-
The number ofX's in the table cels reflects the advantage points of each implementation level.
Five X's implies the best case and one X implies the worst case. Overall, hardware and OS support
will jield the highest performance. However, the hardware and application levels are also the most
expensive to implement. User isolation is the most difficult to achieve. ISA implementation offers
36
the best application flexibility. ualization level. "Application olation" refers to the effort required to isolate
resources committed o different VMs. Each row corresponds to a particular level of virtualization.
37
38
39