cloud
cloud
– User requests for virtual machine management and provisioning are routed from the
Web server through the VMM by means of serverd.
Infrastructure virtualization
Server virtualization
and cloud computing solutions
• vSphere
– Virtual file system, virtual storage, and virtual network constitute the core of the
infrastructure;
– hosts an instance of the Windows Server 2008 R2, which manages the
virtualization stack made available to the child partitions.
Microsoft Hyper-V Microsoft Hyper-V
Child partitions Hypervisor : Directly manages the underlying hardware(processors and memory). It is
• Host guest OS logically defined by thefollowing components:
• Do not have access to the underlying hardware • Hypercalls interface.
• Isolated environments that allow secure and controlled – This is the entry point for all the partitions for theexecution of sensitive
instructions.
execution of guests.
– The parent partition also uses this interface to create child
• Interaction with hardware is controlled by either the
partitions.
parent partition or the hypervisor itself • Memory service routines (MSRs).
• Two types of child partition exist, – Controls the memory and its access from partitions.
– Enlightened partitions • Advanced programmable interrupt controller (APIC).
• Hypervisor-aware – This component represents the interrupt controller,
• can benefit from Enlightened I/O – which manages the signals coming from the underlyinghardware when some
– Unenlightened partitions event occurs (timer expired, I/O ready, exceptions and traps).
• Hypervisor-unaware
• executed by leveraging hardware emulation from the hypervisor.
Microsoft Hyper-V Microsoft Hyper-V
• Scheduler. Enlightened I/O and synthetic devices
– Performs partition creation, finalization, – Virtual Service Clients (VSCs) : represent the virtual device drivers (also called
synthetic drivers) seen by the guest operating systems in the child partitions.
destruction, enumeration, and configurations.
Microsoft Hyper-V Microsoft Hyper-V
Cloud computing and infrastructuremanagement Cloud computing and infrastructuremanagement ….
• Windows Server Core is new version of WindowsServer 2008 • System Center Virtual Machine Manager (SCVMM)
• Windows Server Core
2008. (provides advanced management of VMs)
– reduced set of features and a smaller footprint.
– Management portal for the creation and management ofvirtual instances
– No GUI component and other bulky components such as the .NET Framework and – Virtual to Virtual (V2V) and Physical to Virtual (P2V)
all the applications developed on top of it (for example, PowerShell). conversions
– Advantages – Delegated administration
• Reduced maintenance (i.e., fewer software patches), – Library functionality and deep PowerShell integration
• Reduced attack surface – Intelligent placement of virtual machines in the managed
• Reduced management, environment
• Less disk space – Host capacity management
Module 4
Module 4
Cloud Storage Device
• The cloud storage device
• Cloud Infrastructure Mechanisms
– Cloud Storage Device – Designed specifically for cloud-based
• Cloud Storage Levels provisioning.
• Network Storage Interfaces
• Object Storage Interfaces – Can be virtualized
• Database Storage Interfaces
• Relational Data Storage – Fixed-increment capacity allocation in
• Non-Relational Data Storage support of the pay-per-use mechanism.
• Case Study Example
– Cloud Usage Monitor – Can be remotely accessed via cloud
• Monitoring Agent storage services.
• Resource Agent
• Polling Agent
• Case Study Example
– Resource Replication
• Case Study Example
– Readymade Environment
Cloud Storage Device Cloud Storage Device
Cloud Storage Levels
• Issues and Challenges
Different logical units of data storage are
– Security, integrity, and confidentiality ofdata • Files
– Collections of data are grouped into files that are located in
– Legal and regulatory implications folders.
• Blocks
• Since data are stored across geographical ornational boundaries.
– a block is the smallest unit of data that is still individually
– Performance of large databases accessible.
– lowest level of storage and the closest to the hardware
• Increase in latency
• Datasets
– Sets of data are organized into a table-based, delimited, or
record format.
• Objects
– Data and its associated metadata are organized as Web-basedresources.
Different cloud service consumers utilize differenttechnologies to interface with
virtualized cloud storage devices. Cloud Storage Device
– File : Internet Small Computer System Interface (iSCSI), Fibre Channel (FC) , Fibre
Channel Over Ethernet Logical Unit Numbers FCoE LUNs,
– Object : create, read, update, and delete (or CRUD) operations via HTTP ( Hyper Text
Transfer Protocol)eg: Cloud Data Management Interface (CDMI)
(1) The cloud consumer interacts with the usage and administration portal to create a
cloud storage device anddefine access control policies.
(2)The usage and administration portal interact with the cloud storage software to create (2) The usage and administration portal interact with the cloud storage software to create the
cloud storage device instance and apply the required access policy to its data objects.
the cloud storage device instance and apply access policy to its data objects
– Each data object is assigned to a cloud storage device and all of the data objects are
stored in the same virtual storage volume.
(3) The cloud consumer uses the proprietary cloud storage
device UI to interact directly with the data objects.
• Access control
– Granted on a per-object basis
– Separate access policies are used for creating, reading from, andwriting to each
data object.
– Only read-only access is given for Public access
Cloud storage devices via a The creation of cloud storage devices viaa block storage network interface
• A company offers a cloud service that enables the creation of cloud storage devices via a block The cloud consumer uses the
storage network interface usage and administration portal to
The cloud consumer remotely logs
create and assign a cloud storage
into the virtual server directly (3a)
to access the cloud storage device device to an existing virtual server
(3b).
– Monitoring Agent
– Resource Agent
– Polling Agent
Cloud Usage Monitor
Resource Agent
The resource agent receives a notification fromthe underlying
Resource Agent
resource management program that the virtual server is being • The resource agent is actively monitoring a virtual server and
scaled up and stores the collected usage data in a log database, as detects an increase in usage (1).
per its monitoring metrics (2).
• The resource agent receives a notification from the underlying resource management
program that the virtual server is being scaled up and stores the collected usage data in a
log database, as per its monitoring metrics (2).
Cloud Usage Monitor Cloud Usage Monitor
• A polling agent monitors the status of a cloud service hosted by a virtual server by
sending periodic polling request messages and receiving polling response messages that
report usage status “A” after a number of polling cycles, until it receives a usage status of
“B” (1), upon which the polling agent records the new usage status in the log database
(2).
Cloud Usage Monitor Cloud Usage Monitor
Case Study
The resource agent is designed with logic and metrics that are based
on the following rules:
• A company has recently adopted cloud computing and wants to collect accurate usage 1. Each resource usage event that is generated by the VIM
data. software can contain the following data:
• Virtual servers of varying performancelevels need to be leased and billed hourly. • Event Type (EV_TYPE) – Generated by the VIM platform, there are
five types of events:
• A resource agent that relies on the resource usage events generated by the VIM platform is – VM Starting (creation at the hypervisor)
implemented to calculate the virtual server usage data.
– VM Started (completion of the boot procedure)
– VM Stopping (shutting down)
– VM Stopped (termination at the hypervisor)
– VM Scaled (change of performance parameters)
• VM Type (VM_TYPE) – type of virtual server (based on performance
parameters.
• Unique VM Identifier (VM_ID) – This identifier is provided by the VIM
platform.
• Unique Cloud Consumer Identifier (CS_ID) – Another identifier provided by the VIM
platform to represent the cloud consumer.
• Event Timestamp (EV_T) – An identification of an event occurrencethat is expressed in date-
time format, with the time zone of the data center and referenced to UTC as defined in RFC
3339 (as per the ISO 8601 profile).
Cloud Usage Monitor Cloud Usage Monitor
A high-availability virtual server is running in Data Center A. VIM instances in Data Centers A and B are
executing a coordination function that allows detection of failure conditions. Stored VM images are replicated
between data centers as a result of the high-availability architecture.
Resource Replication
The virtual server becomes unavailable in Data Center A. The VIM in Data Center B detects the failure condition
and starts to reallocate the highavailability server from Data Center A to Data Center B.
Resource Replication
• https://www.intellinetsystem.com/int eli-catalogue-oem.htm
Ready-Made Environment
Ready-Made Environment
Module 4
• Case Study Example
– 8.10 State Management Database
• Case Study Example
• cloud technology architecture following • Balance a workload across two or more IT resources to increase performance and capacity
specialized cloud mechanisms beyond what a single IT resource can provide.
– Load Balancer • Runtime agent, Does Horizontal scaling
– SLA Monitor • Exists on the communication path between the IT resources generating the workload and
the IT resources performing the workload processing
– Pay-Per-Use Monitor
• Load Balancer functions are
– Audit Monitor
– Failover System 1. Asymmetric Distribution
– Hypervisor • larger workloads are issued to IT resources with higher processing
– Resource Cluster capacities
– Multi-Device Broker 2. Workload Prioritization
– State Management Database • workloads are scheduled, queued, discarded, and distributed workloads
according to their priority levels
3. Content-Aware Distribution
• requests are distributed to different IT resources as dictated by the
request content
Load Balancer
A load balancer implemented as a service agent transparently
distributes incoming workload request messages across two redundantcloud service Load Balancer
implementations, which in turn maximizes performance for the cloud service consumers.
• A load balancer has
– Performance and qos rules
– Parameters
• Objectives of load balancer
– Optimizing IT resource usage
– Avoiding overloads
– Maximizing throughput.
• The load balancer mechanisms can exist as a:
– Multi-layer network switch
– Dedicated hardware appliance
– Dedicated software-based system (in server OS)
– Service agent
Load Balancer Load Balancer
New instances of the cloud services are automatically created to meet increasing usage
Case Study requests. The load balancer uses round- robin scheduling to ensure that the traffic is
distributed evenlyamong the active cloud services.
• The Part Number Catalog cloud service has peak usageperiods during the first few days of
every month that coincide with the preparatory processing of heavy stock control routines at
the factories.
• The company upgraded the cloud service to be highly scalable
in order to support the anticipated workload fluctuations.
– Peak workloads are 1,000 times greater than their average
workloads
SLA Monitor SLA Monitor
The SLA monitor polls the cloud service by sending
over polling request messages (MREQ1 to MREQN).
• Observes the runtime performance of cloud services to ensure QoS requirements are The monitor receives polling response messages
fullfilled (MREP1 to MREPN) that report that the service was
– QoS requirements are in SLAs
“up” at each polling cycle (1a).
The SLA monitor stores the “up” time—time period
• SLA management system
of all polling cycles 1 to N—in the log database (1b).
– Process the data collected and aggregate them into SLA
reporting metrics.
• The system can proactively repair or failover cloud services when exceptional conditions occur
(eg, when cloud service is “down”)
The SLA monitor polls the cloud service thatsends polling request
SLA Monitor messages (MREQN+1 to MREQN+M). Polling response messages are not The SLA monitor sends a polling request message
SLA Monitor (MREQN+M+1) and receives the polling response message
received (2a).
The response messages continue to time out, sothe SLA monitor stores the (MREPN+M+1) (3a).The SLA monitor stores the “up” time in
“down” time—time period of all polling cycles N+1 to N+M—in the log the log database (3b).
database (2b).
SLA Monitor
SLA Monitor
Case Study - 2
SLA Monitor
• The steps that are taken by the SLA monitors during the failure and subsequent recovery
of a physical server that is hosting three virtual servers (VM1, VM2, VM3).
Case Study Example …
At timestamp = t2, the SLA for each of the failed host server’s three
At timestamp = t1, the physical host server has failed and becomes unavailable (1). virtual servers (3a).
monitoring agent captures a
VM_failure event that isgenerated
The SLA monitor polling agent stops The SLA monitoring agent captures a
receiving responses from the host VM_unreachable event that is generated for • VM_Unreachable – the VIM cannot reach the VM
serverand issues PS_timeout events eachvirtual server in the failed host server (2a) • VM Failure – the VM has failed and is unavailable
(2b).
• VM_Reachable – the VM is reachable
The SLA monitor polling agent receives At timestamp = t6, the SLA monitoring agent
responses from the physical server and issues captures a VM_reachable event that is generated for
PS_reachable events at timestamp =t5 (5a). each virtual server (5b).
t5
5a 5b
• Measures cloud-based IT resource usage The IT resource is instantiated and the pay-per- use
– Based on predefined pricing parameters monitor receives a “start” event notification from the
resource software (2).
• Generates usage logs for fee calculations andbilling purposes.
• Monitoring metrics:
– Request/response message quantity
– Transmitted data volume (size)
– Bandwidth consumption (bps)
• Billing management system process the collected data and calculates the payment fees
A cloud consumer requests the creation of a The pay-per use monitor stores the value
new instance of a cloud service (1). timestamp in the log database (3).
database (6). • A cloud consumer requests the creation of a new instance of a cloud service (1).
• The IT resource is instantiated and the pay-per- use monitor receives a “start” event
notification from the resource software (2).
• The pay-peruse monitor stores the value timestamp in the log database (3).
• The cloud consumer later requests that the cloudservice instance be stopped (4).
• The payper-use monitor receives a “stop” event notification from the resource software (5)
• The pay-peruse monitor stores the value timestamp in the log database (6).
A pay-per-use monitor designed as a monitoring agent Pay-Per-Use Monitor A pay-per-use monitor designed as a monitoring agent Pay-Per-Use Monitor
Monitoring Agent Monitoring Agent
Intermediary, event-driven program; Existing on communication paths; Transparently monitors Intermediary, event-driven program; Existing on communication paths; Transparently monitors
and analyzes dataflows; Measures network traffic and message metrics. and analyzes dataflows; Measures network traffic and message metrics.
A pay-per-use monitor designed as a monitoring agent Pay-Per-Use Monitor Pay-Per-Use Monitor
Monitoring Agent Case Study Example
Intermediary, event-driven program; Existing on communication paths; Transparently monitors
and analyzes dataflows; Measures network traffic and message metrics.
• A company decides to invest in a commercial system capable of generating invoices based
• A cloud service consumer sends a request message to the cloud service (1). on events pre-defined as “billable” and customizable pricing models.
• The pay-per-use monitor intercepts the message (2), • The installation of the system results in two proprietary databases: the billing event
database and the pricing scheme database.
• Forwards the message to the cloud service (3a),
• Runtime events are collected via cloud usage monitors that are implemented as extensions
• Pay-per-use monitor stores the usage information in accordance with itsmonitoring
to the VIM platform using the VIM’s API.
metrics (3b).
• The pay-per-use monitor agent periodically supplies the
• The cloud service forwards the response messages back to the cloud service
billing system with billable events information.
consumer to provide the requested service (4).
The steps that are taken by pay-per-use
Case Study Example …
• A separate monitoring agent provides furthersupplemental billing-related data, such as:
monitor during a typical usage event.
– Cloud Consumer Subscription Type
• Eg: pre-paid subscription with usage quota, post-paid subscription with
maximum usage quota, and post-paid subscription with unlimited usage.
• Identifies the type of pricing model for usage fee
calculations.
– Resource Usage Category –
• normal usage, reserved IT resource usage, and
premium (managed) service usage.
• The billing management system uses this to identify
the range of usage fees
– Resource Usage Quota Consumption
• When usage contracts define IT resource usage quotas, usage event conditions
are typically supplemented withquota consumption and updated quota limits.
The steps that are taken by pay-per-use The steps that are taken by pay-per-use
monitor during a typical usage event. monitor during a typical usage event.
• The cloud consumer (CS_ID = CS1) creates and starts a virtual server (VM_ID = VM1) of
configuration size type 1 (VM_TYPE = type1) (1).
• The VIM creates the virtual server instance as requested (2a). The VIM’s eventdriven API
generates a resource usage event with timestamp = t1, which is captured and forwarded to
the pay-per-use monitor by the cloud usage monitor (2b).
• The pay-per-use monitor interacts with the pricing scheme database to identify the
chargeback and usage metrics that apply to the resource usage.
• A “started usage” billable event is generated and stored in the billable event log database (3).
• The virtual server’s usage increases and reaches the auto-scaling threshold (4).
• The VIM scales up Virtual Server VM1 (5a) from configuration type 1 to type 2 (VM_TYPE
= type2). The VIM’s event-driven API generates a resource usage event with timestamp =
t2, which is captured and forwarded to the pay-per-use monitor by the cloud usage monitor
(5b).
• The pay-per-use monitor interacts with the pricing scheme database to identify the
chargeback and usage metrics that apply to the updated IT resource usage. A “changed
usage” billable event is generated and stored in the billable event log database (6).
• The cloud consumer shuts down the virtual server (7) and the VIM stops Virtual Server
VM1 (8a).
• The VIM’s event-driven API generates a resource usage event with timestamp = t3, which is
captured and forwarded to the payper- use monitor by the cloud usage monitor (8b).
• The pay-per-use monitor interacts with the pricing scheme database to identify the
chargeback and usage metrics that apply to the updated IT resource usage.
• A “finished usage” billable event is generated and stored in the billable event log database (9).
• The billing system tool can now be used by the cloud provider to access the log database
and calculate the total usage fee for the virtual server as (Fee(VM1)) (10).
Audit Monitor
Audit Monitor An audit monitor implemented as a monitoring agent that intercepts “login” requests and
stores the requestor’s security credentials, as wellas both failed and successful login
attempts, in a log database for future audit reporting purposes.
• Collects audit tracking data for networksand IT resources
• This data support regulatory and
contractual obligations.
• Audit Monitor
– Intercepts “login” requests
– Stores following details in a log databases
• Requestor’s security credentials
• Failed and successful login attempts,
– The stored details will be used for futureaudit
reporting purposes.
Audit Monitor
Audit Monitor Case Study Example
• A cloud service consumer requests access to a cloud service by • A key feature of Innovartus’ role-playing solution is its unique userinterface.
sending a login request message with security credentials (1). • However, the advanced technologies used for its design have imposed licensing restrictions
• The audit monitor intercepts the message (2) and forwards it to the that legally prevent Innovartus from charging users in certain geographical regions for
authentication service (3). usage of the solution.
• The authentication service processes the security credentials. • Innovartus’ legal department is working on getting these issues resolved.
• A response message is generated for the cloud service consumer, in • But in the meantime, it has provided the IT department with a list of countries in which
addition to the results from the login attempt (4). the application can either not be accessed by users or in which user access needs to be free
• The audit monitor intercepts the response message and stores the entire collected login event of charge.
details in the log database, as per the organization’s audit policy requirements (5). • In order to collect information about the origin of clients accessing the application,
Innovartus asks its cloud provider to establish an audit monitoring system.
• Access has been granted, and a response is sent back to the cloud
service consumer (6). • The cloud provider deploys an audit monitoring agent to intercept each inbound message,
analyze its corresponding HTTP header, and collect details about the origin of the end-
user.
• As per Innovartus’ request, the cloud provider further adds a log database to collect the
regional data of each end-user request for future reporting purposes.
• Innovartus further upgrades its application so that end-users from selectcountries are able
to access the application at no charge
Audit Monitor Audit Monitor
• Some failover systems are designed to redirect workloads to active IT resources that rely on
specialized load balancers that detect failure conditions and exclude failed IT resource • DTGOV creates a resilient virtual server to support the allocation of virtual server
instances from the workload distribution. instances that are hosting critical applications, which are being replicated in multiple
• This type of failover system is suitable for IT resources that do not require execution state data centers.
management and provide stateless processing capabilities.
• The replicated resilient virtual server has an associated active-passive failover system.
• In technology architectures that are typically based on clustering and virtualization
technologies, the redundant or standby IT resource implementations are also required to • Its network traffic flow can be switched between the IT resource instances that are residing at
share their state and execution context. different data centers, if the active instance were to fail.
• A complex task that was executed on a failed IT resource can
remain operational in one of its redundant implementations.
A resilient virtual server is established by replicating the virtual server instanceacross two
different data centers, as performed by the VIM that is running at both data centers. The SLA monitors detect when the active virtualserver instance becomes unavailable.
active instance receives the network traffic and is vertically scaling in response, while the
standby instance has no workload and runs at the minimum configuration.
Failover System …
The failover system is implemented as an event-driven software agent that intercepts the
message notifications the SLA monitors send regarding server unavailability. In response, The failed virtual server instance is revived and scaled down tothe minimum standby instance
the failover system interacts with the VIM and network management tools to redirect all of the configuration after it resumes normal operation.
network traffic to the now-activestandby instance.
Hypervisor
Hypervisor Virtual servers are created via individual hypervisor on
individual physical servers.
All three hypervisors are jointly controlled by the same VIM.
• Fundamental part of virtualization infrastructure
• Used to generate virtual server instances of a physical server.
• A hypervisor
– Limited to one physical server
– Can create virtual images of that server
– Assign virtual servers to resource pools that reside on the same
underlying physical server.
– A hypervisor has limited virtual server management features, such as increasing the
virtual server’s capacity or shutting it down.
– Is installed directly in bare-metal servers.
– Provides features for controlling, sharing and scheduling the usage of hardware
resources, such as processor power, memory, and i/o (these resources can appear to each
virtualserver’s os as dedicated resources)
• The VIM provides a range of features for administering multiple hypervisors across
physical servers.
Hypervisor Hypervisor
Case Study Example A virtual server capable of auto-scaling
Case Study Example… experiences an increase in its workload
• A company has established a virtualization platform in which the same hypervisor
software product is running on all physical servers.
(1).
• The VIM coordinates the hardware resources in each data center so that virtual server The VIM decides that the virtual server
instances can be created from the most convenient underlying physical server.
• As a result, cloud consumers are able to lease virtual
cannot scale up because its underlying
servers with autoscaling features. physical server host is being used by
• The company’s virtualization platform provides live VM migration of virtual servers among
physical servers inside the same data center. other virtual servers (2).
– where a virtual server live-migrates from one busy physical server to another that is
idle, allowing it to scale up in response to an increase in its workload.
Hypervisor
• Server Cluster
– Physical or virtual servers are clustered to increase performance and availability.
– Virtual servers are able to live migrate from one to another
Loosely Coupled vs tightly coupled servers
• Database Cluster
• The cluster nodes in high availability cluster architectures need to access and share
– Designed to improve data availability
common storage IT resources.
– Synchronization feature maintains the consistency of data being stored at different
• This can require two layers of communication between the nodes—one for accessing the
storage devices used in the cluster. storage device and another to execute IT resource orchestration
• Large Dataset Cluster • Some resource clusters are designed with more loosely coupled IT resources that only
– Data partitioning and distribution is implemented so that the target datasets can be require the network layer
efficiently partitioned without compromising data integrity or computing accuracy.
A loosely coupled server cluster that incorporates a load
Load balancing and resource replication are implemented through a cluster-enabled balancer. There is no shared storage.
hypervisor. A dedicated storage area network is used to connect the clustered storage and the Resource replication is used to replicate cloud storage devices
clustered servers, which are able to share common cloud storage devices. This simplifiesthe through the network by the cluster software.
storage replication process, which is independently carried out at the storage cluster.
Two basic types of resourceclusters
• Load Balanced Cluster Case Study Example
A multi-device broker contains the mapping logic necessary to transform data exchanges between a cloud service and different types
of cloud service consumer devices.This scenario depicts the multi- device broker as a cloud service with its own API.This mechanism
canalso be implemented as a service agent that intercepts messages at runtime to perform necessary transformations.
Multi-Device Broker …
• Multi-device brokers commonly exist as gateways or incorporate gateway components,
such as:
2. Cloud Storage Gateway – transforms cloud storage protocols and encodes storage
devices to facilitate data transfer and storage
• A multi-device broker may contain mapping logic that coverts both transport and
messaging protocols for a cloud service consumer accessing a cloud service with a mobile
device.
The cloud service processes the request and responds using the same standard format
(3).
The multi-device broker transforms the response message into the format required bythe source device and delivers the message (4).
By deferring state data to a state repository, the cloud service is able to transition to a stateless condition (or a partially Case Study Example
statelesscondition), thereby temporarily freeing system resources. • ATN is expanding its ready-made environment architecture to allow for the deferral of state
information for extended periods by utilizing the statemanagement database mechanism.
• Following figures demonstrates how a cloud service consumer working with a ready-made
environment pauses activity,causing the environment to off-load cached state data.
State Management DatabaseCase Study Example The cloud consumer accesses the ready-made environment and requires three virtual
…
servers to perform all activities (1).
The cloud consumer pauses activity. All of the state data needs to be preserved for
future access to the ready-made environment (2).
The underlying infrastructure is automatically scaled in by reducing the number of
virtual servers.
State data is saved in the state management database and one virtual server remains
active to allow for future logins by the cloud consumer (3).
At a later point, the cloud consumer logs in and accesses the ready-made environment to continue activity (4).
The underlying infrastructure is automatically scaled out by increasing the number of virtual servers and by retrieving the
statedata from the state management database (5).
State Management Database
• Two primary types of portals that are createdwith the remote administration system:
• Usage and administration portal
– Centralizes management controls to different cloud-based IT resources
– Further provide IT resource usage reports.
• Self-service portal
– Allows cloud consumers to search an up-to-date list of cloud services and it resources
that are available from a cloud provider.
– The cloud consumer submits its chosen items to
the cloud provider for provisioning.
Remote Administration System … Remote Administration System …
new
Remote Administration System … Remote Administration System …
Tasks performed by cloud consumers via a remote
administration console:
• A cloud resource administrator uses the usage and administration portal to configure an • Configuring and setting up cloud services
already leased virtual server (not shown) to prepare it for hosting (1).
• The cloud resource administrator then uses the self- service portal to select and request the • Provisioning and releasing IT resource for on-demand cloud
provisioning of anew cloud service (2). services
• The cloud resource administrator then accesses the usage and administration portal again • Monitoring cloud service status, usage, and performance
to configure the newly provisioned cloud service that is hosted on the virtual server (3).
• Monitoring qos and SLA fulfillment
• Throughout these steps, the remote administration system interacts with the necessary
management systems to perform the requested actions (4). • Managing leasing costs and usage fees
• Managing user accounts, security credentials, authorization,
and access control
• Tracking internal and external access to leased services
• Planning and assessing IT resource provisioning
• Capacity planning
Remote Administration System …
Remote Administration System
…
Depending on:
– The type of cloud product or cloud delivery model the cloud
consumer is leasing or using from the cloud provider,
– The level of access control granted by the cloud provider to the
cloud consumer, and
– Which underlying management systems the remote
administration system interfaces with
Remote Administration System
…
Standardized APIs published by remote administration systems from different clouds
• Advantage of standardized APIs over Propreitary Uis
enable a cloud consumer todevelop a custom portal that centralizes a single IT resource
management portal for both cloud-based and onpremise IT resources. – A cloud consumer can create own front-end late it can be reused if it decides to move
to another cloud provider that supports the samestandardized API.
– The cloud consumer would be able to centrally administer IT resources from multiple
cloud providers and/or IT resources residing in cloud and on-premise environments.
– User-interface provided by the remoteadministration system will tend to be proprietary to
the cloud provider
Remote Administration System …
Resource Management System
Case Study Example
DTGOV has been offering its cloud consumers a user-friendly remote administration system
for some time, and recently determined that upgrades are required in order to accommodate the
growing number of cloud consumers and increasing diversity of requests.
DTGOV is planning a development project to extend the remote • Helps coordinate IT resources in response
administration system to fulfill the following requirements: – to management actions performed by both cloud
– Cloud consumers need to be able to self-provision virtual consumers and cloud providers
servers and virtual storage devices. • Core to this system is the virtual infrastructure manager (VIM)
– A single sign-on mechanism needs to be incorporated to centrally authorize and
control cloud consumer access. – VIM coordinates the server hardware so that virtual server instances can be created
from the mostexpedient/convenient underlying physical server.
– An API that supports the provisioning, starting, stopping, releasing, updown scaling,
and replicating of commands for virtual servers and cloud storage devices needs to be – A VIM manages a range of virtual IT resources acrossmultiple physical servers.
exposed. – A VIM creates and manages multiple instances of a hypervisor across different physical
In support of these features, a self-service portal is developed and the feature-set of DTGOV’s servers or allocate a virtual server on one physical server to another (or to a resource
existing usage and administration portal is extended. pool).
Resource Management System Resource Management System
• A resource management system encompassing a VIM • Tasks that are typically automated and implemented
platform and a virtual machine image repository. through the resource management system include:
• The VIM may have additional repositories, including one – Managing virtual IT resource templates that are used to create pre-built instances, such
as virtual server images
dedicated to storing operational data.
– Allocating and releasing virtual IT resources into the available physical
infrastructure in response to the starting, pausing, resuming, and termination of
virtual IT resource instances
– Coordinating IT resources in relation to the involvementof other mechanisms, such as
resource replication, load balancer, and failover system
– Enforcing usage and security policies throughout the
lifecycle of cloud service instances
– Monitoring operational conditions of IT resources
Resource Management System Resource Management System
The cloud consumer’s cloud resource administrator accesses a usage and administration portal externally to administer a leased
Resource Management System Resource Management System
IT resource(1).
The cloud provider’s cloud resource administrator uses the nativeuser-interface provided by the VIM to perform internal Case Study Example
resource management tasks (2).
The DTGOV resource management system is an extension of a new VIM product it purchased,
and provides the following primary features:
– Management of virtual IT resources with a flexible allocation of pooled IT resources
across different datacenters
– Management of cloud consumer databases
– Isolation of virtual IT resources at logical perimeter
networks
– Management of a template virtual server image inventory
available for immediate instantiation
– Automated replication (“snapshotting”) of virtual server
images for virtual server creation
– Automated up-down scaling of virtual servers according to
usage thresholds to enable live VM migration among
physical servers
Resource Management System
Case Study Example … SLA Management System
The DTGOV resource management system is an extension of a new VIM product it purchased,
and provides the following primary features ….
• Provides features like administration, collection, storage, reporting, and runtime
• An API for the creation and management of virtual servers notification of SLA data
and virtual storage devices
• An SLA management system has
• An API for the creation of network access control rules
• An API for the up-down scaling of virtual IT resources – An SLA manager
• An API for the migration and replication of virtual IT resources across multiple data – A QoS measurements repository.
centers
• Interoperation with a single sign-on mechanism through an LDAP (lightweight directory
access protocol) interface
• Custom-designed SNMP (simple network management protocol) command scripts are
further implemented to interoperate with the network management tools to establish
isolated virtual networks across multiple data centers.
SLA Management System