0% found this document useful (0 votes)
13 views14 pages

IaaS Unit-2

IaaS (Infrastructure as a Service) is a cloud computing model that provides virtualized computing resources over the internet, allowing businesses to access computing power without managing physical servers. Key components include compute, storage, networking, and various management tools, with advantages such as scalability, cost efficiency, and reduced maintenance. Major providers include AWS, Microsoft Azure, and Google Cloud Platform, each offering unique features and strengths in the cloud services market.

Uploaded by

mithunr9961
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views14 pages

IaaS Unit-2

IaaS (Infrastructure as a Service) is a cloud computing model that provides virtualized computing resources over the internet, allowing businesses to access computing power without managing physical servers. Key components include compute, storage, networking, and various management tools, with advantages such as scalability, cost efficiency, and reduced maintenance. Major providers include AWS, Microsoft Azure, and Google Cloud Platform, each offering unique features and strengths in the cloud services market.

Uploaded by

mithunr9961
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Overview of IaaS

IaaS (Infrastructure as a Service) is a cloud computing model that provides virtualized


computing resources over the internet. It is one of the primary categories of cloud services,
alongside Software as a Service (SaaS) and Platform as a Service (PaaS). IaaS offers businesses
and developers access to computing resources without the need to own or manage physical servers
or data centers.

Key Components of IaaS:

1. Compute: Virtual machines (VMs) and CPUs for processing power. Users can scale their
computing resources up or down based on their needs.
2. Storage: Scalable storage solutions, such as block storage, object storage, or file storage,
that allow users to store and manage data securely.
3. Networking: Virtualized networking resources, including firewalls, load balancers, and
VPNs, to manage and control traffic to and from their cloud infrastructure.
4. Other Resources: These may include monitoring tools, management software, and
security services.

Key Characteristics:

 Scalability: IaaS provides flexible resources, allowing users to increase or decrease their
infrastructure needs based on demand (e.g., scaling up during high-traffic times or scaling
down when demand is low).
 Pay-as-you-go model: Customers only pay for the resources they use, which makes it cost-
effective and eliminates the need for large upfront investments in physical hardware.
 On-demand resources: Users can quickly provision and manage resources (compute,
storage, and networking) from anywhere with internet access.
 Automation and management: Many IaaS providers offer tools and APIs for automating
tasks like provisioning, monitoring, and scaling, which reduces the burden on IT teams.

Advantages of IaaS:

 Cost Efficiency: No need for capital investment in physical hardware or infrastructure, and
businesses only pay for what they consume.
 Flexibility and Agility: Easily scale up or down resources depending on project needs or
business demands.
 Reduced Maintenance: Cloud providers handle hardware maintenance, reducing the
burden on internal IT teams.
 Global Reach: Cloud infrastructure can be deployed in multiple regions, providing low-
latency access to users worldwide.

Popular IaaS Providers:


 Amazon Web Services (AWS): Offers a wide range of services including EC2 (Elastic
Compute Cloud), S3 (Simple Storage Service), and VPC (Virtual Private Cloud).
 Microsoft Azure: Provides services such as Azure Virtual Machines and Azure Blob
Storage.
 Google Cloud Platform (GCP): Offers Compute Engine and Cloud Storage.
 IBM Cloud: Provides a range of IaaS offerings for enterprises and developers.

Introduction to IaaS providers (AWS, Azure, Google Cloud Platform)

IaaS (Infrastructure as a Service) is a cloud computing model that provides virtualized


computing resources over the internet. It is one of the primary categories of cloud services,
alongside Software as a Service (SaaS) and Platform as a Service (PaaS). IaaS offers businesses
and developers access to computing resources without the need to own or manage physical servers
or data centers.

Key Components of IaaS:

1. Compute: Virtual machines (VMs) and CPUs for processing power. Users can scale their
computing resources up or down based on their needs.
2. Storage: Scalable storage solutions, such as block storage, object storage, or file storage,
that allow users to store and manage data securely.
3. Networking: Virtualized networking resources, including firewalls, load balancers, and
VPNs, to manage and control traffic to and from their cloud infrastructure.
4. Other Resources: These may include monitoring tools, management software, and
security services.

Key Characteristics:

 Scalability: IaaS provides flexible resources, allowing users to increase or decrease their
infrastructure needs based on demand (e.g., scaling up during high-traffic times or scaling
down when demand is low).
 Pay-as-you-go model: Customers only pay for the resources they use, which makes it cost-
effective and eliminates the need for large upfront investments in physical hardware.
 On-demand resources: Users can quickly provision and manage resources (compute,
storage, and networking) from anywhere with internet access.
 Automation and management: Many IaaS providers offer tools and APIs for automating
tasks like provisioning, monitoring, and scaling, which reduces the burden on IT teams.

Advantages of IaaS:

 Cost Efficiency: No need for capital investment in physical hardware or infrastructure, and
businesses only pay for what they consume.
 Flexibility and Agility: Easily scale up or down resources depending on project needs or
business demands.
 Reduced Maintenance: Cloud providers handle hardware maintenance, reducing the
burden on internal IT teams.
 Global Reach: Cloud infrastructure can be deployed in multiple regions, providing low-
latency access to users worldwide.

Popular IaaS Providers:

 Amazon Web Services (AWS): Offers a wide range of services including EC2 (Elastic
Compute Cloud), S3 (Simple Storage Service), and VPC (Virtual Private Cloud).
 Microsoft Azure: Provides services such as Azure Virtual Machines and Azure Blob
Storage.
 Google Cloud Platform (GCP): Offers Compute Engine and Cloud Storage.
 IBM Cloud: Provides a range of IaaS offerings for enterprises and developers.

Introduction to IaaS Providers: AWS, Azure, and Google Cloud Platform (GCP)

Infrastructure as a Service (IaaS) is a cloud computing model where third-party providers offer
on-demand virtualized computing resources over the internet. Leading IaaS providers like
Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) provide
flexible, scalable, and cost-effective solutions to businesses and developers for running
applications, managing data, and provisioning infrastructure.

1. Amazon Web Services (AWS)

AWS, launched by Amazon in 2006, is the largest and most widely adopted cloud platform
globally. AWS provides a comprehensive suite of cloud services, ranging from computing and
storage to databases, networking, machine learning, analytics, and more. It is known for its
reliability, scalability, and large ecosystem of services.
Key Features of AWS:

 Elastic Compute Cloud (EC2): A virtual server that allows users to run applications in
the cloud. EC2 instances come in a wide variety of configurations, allowing users to choose
the best instance for their workload.
 Simple Storage Service (S3): Object storage service that provides scalable, secure storage
for any amount of data. S3 is widely used for storing backups, media, and large datasets.
 Elastic Block Store (EBS): A block-level storage service used in conjunction with EC2 to
store data.
 Virtual Private Cloud (VPC): Enables users to create isolated network environments
within AWS, allowing secure communication between different services and resources.
 Elastic Load Balancing (ELB): A service that automatically distributes incoming traffic
across multiple EC2 instances to ensure reliability and availability.
 AWS Lambda: A server less computing service that allows users to run code in response
to events without provisioning or managing servers.
 Amazon RDS (Relational Database Service): Managed relational database service for
MySQL, PostgreSQL, Oracle, and other databases.
 Auto Scaling: Automatically adjusts the amount of computational resources based on
demand, ensuring cost efficiency and optimal performance.
Strengths of AWS:

 Market Leadership: AWS is the most popular IaaS provider with a vast global presence,
offering more regions and availability zones than any other cloud provider.
 Extensive Service Portfolio: AWS offers a broad range of services, which allows
organizations to build, deploy, and manage almost any workload in the cloud.
 Strong Ecosystem: AWS integrates with a wide range of third-party tools, applications,
and services.

2. Microsoft Azure

Launched by Microsoft in 2010, Azure is the second-largest cloud provider globally and is known
for its deep integration with Microsoft products like Windows Server, SQL Server, and Office 365.
It offers a broad set of cloud services, including computing, storage, databases, networking, and
developer tools.
Key Features of Azure:

 Azure Virtual Machines (VMs): Offers scalable virtualized computing resources, similar
to EC2 in AWS. Azure VMs can be used to run a wide range of applications, including
Windows and Linux-based workloads.
 Azure Blob Storage: Object storage service designed for storing large amounts of
unstructured data, such as text or binary data (e.g., video, images).
 Azure Virtual Network (VNet): Provides a secure, isolated network environment for
users to deploy and manage virtual machines and other resources.
 Azure Load Balancer: Distributes incoming network traffic across multiple VMs to
ensure high availability and fault tolerance.
 Azure SQL Database: Managed relational database service that supports SQL Server-
based applications in the cloud.
 Azure App Services: A platform for building, deploying, and managing web applications
and APIs.
 Azure Kubernetes Service (AKS): Managed Kubernetes service for containerized
applications, enabling easy orchestration of container deployments.
 Azure Functions: Serverless computing platform that runs code without requiring users to
manage infrastructure, similar to AWS Lambda.
 Azure Active Directory (AD): Cloud-based identity and access management service that
helps organizations manage user authentication and authorization.
Strengths of Azure:

 Hybrid Cloud Support: Azure is particularly strong in hybrid cloud environments,


allowing organizations to seamlessly integrate on-premises data centers with cloud
resources.
 Integration with Microsoft Ecosystem: For enterprises already using Microsoft products
(e.g., Windows Server, Active Directory, Office 365), Azure offers smooth integration and
a familiar environment.
 Enterprise Focus: Azure has a strong focus on large-scale, enterprise-level organizations,
offering a range of compliance certifications and enterprise-specific tools.

3. Google Cloud Platform (GCP)

Google Cloud Platform (GCP) is a comprehensive suite of cloud services offered by Google,
known for its strengths in data analytics, machine learning, and containerized applications. GCP
is a growing player in the IaaS space and is gaining traction for its cutting-edge technologies.
Key Features of GCP:

 Google Compute Engine (GCE): Provides scalable virtual machines, allowing users to
run custom applications, websites, and services on Google’s infrastructure.
 Google Cloud Storage: Object storage service designed to store large amounts of data
with low latency and high availability. It’s designed for global scalability and is often used
for data analytics and backup storage.
 Google Kubernetes Engine (GKE): Managed Kubernetes service that simplifies the
deployment, scaling, and management of containerized applications.
 Cloud Load Balancing: Distributes incoming traffic across multiple VMs or containers to
ensure high availability and reliability.
 Google Cloud SQL: Managed database service that supports MySQL, PostgreSQL, and
SQL Server, providing automatic scaling, backups, and updates.
 BigQuery: A fully-managed, serverless data warehouse designed for large-scale data
analytics. It can analyze petabytes of data in real-time.
 Firebase: A suite of cloud-based tools for mobile and web application development,
offering features like authentication, databases, and hosting.
 Google Cloud Functions: Serverless computing platform that allows developers to run
code without worrying about infrastructure management, similar to AWS Lambda and
Azure Functions.
 TensorFlow and AI/ML Services: GCP is known for its AI and machine learning
capabilities, offering tools like TensorFlow and pre-built models for specific tasks like
image and language processing.
Strengths of GCP:

 Data Analytics & Machine Learning: GCP is particularly strong in data-driven


applications, offering services for big data analytics and machine learning, leveraging
Google’s deep expertise in AI.
 Containerization and Kubernetes: GCP is widely recognized as the leader in
containerized application management, primarily due to its development of Kubernetes,
the most popular container orchestration platform.
 Network Infrastructure: Google’s private global network provides high-speed and low-
latency connections between data centers, making it ideal for global applications requiring
real-time data processing.
 Developer-Friendly: GCP provides extensive support for developers, with powerful APIs,
development tools, and strong open-source community involvement.

Comparison of AWS, Azure, and GCP:


Feature AWS Azure GCP
Growing fast, especially in
Market Leader Yes Second Largest
AI and ML
EC2 (Elastic Compute Azure Virtual
Compute Services Compute Engine (GCE)
Cloud) Machines (VMs)
S3 (Simple Storage
Storage Blob Storage Cloud Storage
Service)
VPC (Virtual Private Virtual Network Virtual Private Cloud
Networking
Cloud) (VNet) (VPC)
RDS (Relational
Database Services Azure SQL Database Cloud SQL, BigQuery
Database Service)
EKS (Elastic Azure Kubernetes Google Kubernetes
Containerization
Kubernetes Service) Service (AKS) Engine (GKE)
Serverless AWS Lambda Azure Functions Cloud Functions
Azure Machine
Machine Learning SageMaker TensorFlow, AI/ML APIs
Learning
Hybrid Cloud Strong Hybrid Strong in multi-cloud and
Limited focus
Support Integration hybrid setups

Introduction to Virtualization Technologies: KVM, Xen, and VMware

Virtualization technologies allow multiple virtual instances (also known as virtual machines, or
VMs) to run on a single physical server. These virtual machines can run different operating systems
and applications, providing efficient use of hardware resources and isolation between workloads.
Virtualization plays a vital role in modern data centers, cloud computing, and IT infrastructures,
offering benefits like cost savings, scalability, flexibility, and efficient resource management.

Three of the most widely used virtualization technologies are KVM (Kernel-based Virtual
Machine), Xen, and VMware. Each of these technologies has its strengths and use cases, and they
vary in terms of architecture, functionality, and deployment.

1. KVM (Kernel-based Virtual Machine)

KVM is an open-source virtualization technology built into the Linux kernel. It allows Linux to
function as a hypervisor, enabling the creation and management of virtual machines. KVM is used
primarily in Linux environments and is one of the most popular and widely adopted virtualization
technologies in cloud computing.
Key Features:

 Type 1 Hypervisor: KVM is a Type 1 hypervisor (also known as a "bare-metal"


hypervisor), meaning it runs directly on the physical hardware of the host machine, with
no need for an underlying host operating system. However, in practice, KVM runs on top
of the Linux operating system, which is why it's often referred to as a "hosted" hypervisor.
 Open Source: KVM is completely open-source, which makes it highly customizable and
free to use. It's licensed under the GPL (General Public License).
 Hardware Virtualization: KVM takes advantage of hardware virtualization extensions,
such as Intel VT-x or AMD-V, to provide near-native performance for virtual machines.
 Support for Multiple OSes: KVM supports running a wide variety of guest operating
systems, including Linux, Windows, and others.
 Scalability: KVM scales well to handle high numbers of virtual machines and large
workloads, which makes it suitable for cloud environments like OpenStack.
 Integration with Other Tools: KVM integrates seamlessly with various management
tools and frameworks like libvirt (for managing VMs), QEMU (for emulation), and
VirtManager (for GUI management).
Strengths of KVM:

 Native Performance: Due to hardware-assisted virtualization, KVM offers high-


performance virtual machines with minimal overhead.
 Flexibility and Customization: As an open-source solution, KVM allows users to
customize and extend its functionality according to specific needs.
 Integration with Linux: Since it is integrated into the Linux kernel, KVM benefits from
the robustness and features of the Linux ecosystem.
 Cloud Compatibility: KVM is a preferred hypervisor for many cloud platforms, such as
OpenStack, because of its open-source nature and scalability.

2. Xen

Xen is another open-source, Type 1 hypervisor that allows multiple operating systems to run on a
single physical machine. Originally developed by Cambridge University and later supported by
Citrix, Xen is widely used in cloud computing environments, particularly in private clouds and
virtualized server infrastructures.
Key Features:

 Type 1 Hypervisor: Like KVM, Xen is a bare-metal hypervisor, meaning it runs directly
on the physical hardware of the host machine.
 Paravirtualization & Hardware Virtualization: Xen offers two modes for virtualization:
o Full Virtualization (using hardware extensions like Intel VT or AMD-V) allows
for virtualizing guest operating systems without modifications.
o Paravirtualization allows the guest OS to be modified to be aware of the
hypervisor, enabling more efficient use of resources but limiting the types of guest
operating systems that can be run.
 Xen Hypervisor: The Xen hypervisor itself is a small, efficient layer that handles the
management of virtual machines and physical resources. It sits between the hardware and
the guest operating systems, ensuring that they are isolated from one another.
 Virtual Machine Manager (XAPI): Xen provides management tools such as XAPI for
controlling and automating the deployment and management of virtual machines.
 Support for Multiple OSes: Xen can run various guest operating systems, including
Linux, Windows, and others, using either paravirtualization or hardware-assisted
virtualization.
Strengths of Xen:

 Isolation and Security: Xen is known for strong isolation between virtual machines,
making it ideal for multi-tenant environments where security and stability are critical.
 Performance: Xen's paravirtualization model allows for high performance, especially for
workloads that can be optimized for this architecture.
 Cloud Integration: Xen is used in some of the largest cloud environments, such as
Amazon Web Services (AWS), which initially used Xen for its virtualization.
 Enterprise Support: Citrix provides commercial support for Xen and XenServer, making
it an enterprise-grade solution for large-scale virtualization.

3. VMware

VMware is one of the most popular commercial virtualization solutions. It offers a suite of
products for creating and managing virtual machines, and is particularly well-known for its robust
and feature-rich enterprise offerings. VMware is a Type 1 hypervisor that has been in the market
for many years and is widely used in enterprise data centers.
Key Features:

 VMware ESXi: VMware's flagship hypervisor, ESXi, is a bare-metal Type 1 hypervisor


that runs directly on the physical hardware. It provides robust management features and is
highly scalable.
 VMware vSphere: This is VMware's suite of tools for managing virtualized environments.
It includes ESXi, VMware vCenter for centralized management, and other tools for high
availability, disaster recovery, and load balancing.
 vMotion: A feature that allows live migration of virtual machines from one host to another
without downtime, which is essential for load balancing and minimizing service
disruptions.
 Storage and Networking Integration: VMware provides integrated solutions like vSAN
for storage and NSX for networking, making it a comprehensive platform for managing
virtualized resources.
 VMware Tools: A suite of utilities that enhances the performance and manageability of
virtual machines running on VMware, including drivers and integration with the VMware
hypervisor.
 Enterprise Features: VMware provides extensive support for high availability (HA), fault
tolerance (FT), resource management, and monitoring tools, which are designed for
enterprise-scale environments.
Strengths of VMware:

 Mature and Feature-Rich: VMware has a long history in virtualization and offers a wide
range of tools and features designed for large-scale, enterprise environments.
 Enterprise Support: VMware offers commercial support, training, and extensive
documentation, making it a reliable choice for businesses.
 High Availability and Fault Tolerance: Features like vMotion, HA, and FT make
VMware highly suitable for mission-critical applications and ensuring uptime.
 Comprehensive Management: VMware’s suite of management tools, including vSphere,
vCenter, and vRealize, provide centralized management for large environments with
complex infrastructure needs.

Comparison of KVM, Xen, and VMware


Feature KVM Xen VMware
Type of
Type 1 (bare-metal) Type 1 (bare-metal) Type 1 (bare-metal)
Hypervisor
Proprietary
Licensing Open-source (GPL) Open-source (Apache)
(Commercial license)
High (hardware-assisted High (paravirtualization + High (optimized for
Performance
virtualization) hardware virtualization) enterprise workloads)
Guest OS Linux, Windows,
Linux, Windows, others Linux, Windows, others
Support others
Enterprise Limited commercial Citrix commercial support Extensive enterprise
Support support available support
Widely used in VMware Cloud,
Cloud Support Used by AWS, XenServer
OpenStack vSphere
Scalable, flexible, cloud High performance, security, vSphere suite, HA,
Features
integration cloud focus vMotion, FT
Private cloud, open-
Cloud providers, high- Enterprise data centers,
Use Cases source cloud
performance workloads VDI
environments

Storage in IaaS: Block Storage vs Object Storage

In the context of Infrastructure as a Service (IaaS), storage refers to the cloud services that
allow users to store, manage, and access data on virtual machines or cloud servers. IaaS providers
typically offer two primary types of storage: block storage and object storage. Both have distinct
characteristics and use cases, catering to different storage needs.
1. Block Storage

Block storage is a storage model that breaks data into blocks, each with a unique identifier. Each
block is stored separately, and the operating system manages these blocks like a hard drive. In
cloud environments, block storage is typically used to store data that requires high performance
and low-latency access, such as operating system files, databases, and application data.
How Block Storage Works:

 Block storage works by dividing data into fixed-size blocks (typically 512 MB or 4 KB),
each with a unique address.
 Each block can be independently read or written to, allowing for fast and efficient access
to the data.
 The data is typically stored on networked storage devices, like Storage Area Networks
(SANs) or cloud block storage systems, and is presented to the user as a hard drive.
 It’s a low-level storage system, meaning it works like a physical disk that is directly
attached to a machine.
Key Features:

 Performance: Block storage is designed for high-performance use cases, offering fast read
and write speeds. It’s ideal for workloads like databases, where fast access to individual
data points is crucial.
 Flexibility: You can attach block storage volumes to different virtual machines and resize
them as needed. Data in block storage can also be formatted with file systems such as
NTFS, EXT4, or XFS, depending on the operating system.
 Persistence: Unlike ephemeral storage, block storage persists even if the virtual machine
is stopped or terminated.
 Low Latency: Block storage provides low-latency access to data, making it suitable for
high-performance applications.
 Backup and Snapshots: Block storage supports features like snapshots, which allow users
to create point-in-time backups of the data. These snapshots are useful for disaster recovery
or versioning.

Examples of Block Storage in IaaS Providers:

 Amazon Elastic Block Store (EBS) – AWS provides block-level storage volumes for EC2
instances.
 Azure Managed Disks – Microsoft Azure offers block storage as managed disks,
providing scalability and ease of management.
 Google Persistent Disk – Google Cloud provides scalable block storage that can be
attached to virtual machines (VMs) running on Google Compute Engine.

2. Object Storage
Object storage is a storage model that stores data as objects, each consisting of the data itself,
metadata, and a unique identifier (or key). Unlike block storage, object storage doesn’t have a file
system or hierarchy of directories. Instead, data is stored as individual objects, which can be
accessed using a unique key or URL. It is highly scalable and is optimized for storing large
amounts of unstructured data, such as images, videos, backups, and logs.
How Object Storage Works:

 In object storage, data is stored as objects rather than blocks. Each object includes the data
itself, metadata (descriptive information about the object), and a globally unique identifier.
 These objects are stored in a flat namespace (there is no folder structure like in block
storage or file systems). The metadata associated with each object allows for efficient
retrieval of data.
 Objects are accessed via HTTP/HTTPS protocols, making them easy to interact with via
RESTful APIs. This makes object storage particularly well-suited for cloud-based
applications.
 Object storage systems are designed to scale horizontally, meaning they can easily handle
massive amounts of data across distributed clusters of servers.
Key Features:

 Scalability: Object storage is highly scalable and can store virtually unlimited amounts of
data. It is ideal for applications that need to store large datasets (e.g., big data, video files,
backups).
 Durability: Object storage typically includes built-in redundancy and replication, ensuring
that data is stored reliably even in the event of hardware failure. Many object storage
services offer 99.999999999% durability (11 nines).
 Cost-Effective: Object storage is often more affordable than block storage for storing large
quantities of unstructured data because it is optimized for storage efficiency.
 Access via APIs: Object storage is accessed over the internet through simple APIs, which
makes it highly compatible with cloud-native applications.
 Unstructured Data: It is perfect for storing unstructured data such as videos, images, log
files, backups, and backups.
 Data Integrity and Versioning: Object storage provides features like data integrity
checks, versioning, and lifecycle policies (e.g., moving objects to cheaper storage tiers after
a certain period).
Examples of Object Storage in IaaS Providers:

 Amazon S3 (Simple Storage Service) – AWS's most popular object storage solution,
offering scalable, secure, and cost-effective storage for unstructured data.
 Azure Blob Storage – Microsoft Azure’s object storage service for storing large amounts
of unstructured data such as media files, backups, and logs.
 Google Cloud Storage – Google Cloud’s scalable object storage solution designed for a
wide variety of use cases, including data archiving, backup, and analytics.

Comparison of Block Storage vs Object Storage


Feature Block Storage Object Storage
Data Data is stored in fixed-size blocks Data is stored as objects with metadata and a
Structure with a file system unique identifier
High performance, low latency, Lower performance compared to block
Performance
ideal for I/O-intensive tasks storage but highly scalable
Databases, OS files, high- Backup, archival, unstructured data (e.g.,
Use Case
performance applications media files)
Scales by increasing the number of Highly scalable and can store petabytes of
Scalability
volumes or resizing volumes unstructured data
Access Mount as a drive, typically Accessed via HTTP/HTTPS APIs, object
Method accessed via file systems key-based retrieval
More expensive for large amounts More cost-effective for large-scale storage,
Cost
of data due to performance especially for unstructured data
Data Dependent on cloud provider’s Extremely high durability (e.g., 11 nines) due
Durability redundancy setup to replication across multiple locations
VM disks, databases, enterprise Web content storage, backups, media
Use in Cloud
applications streaming, big data analytics
Amazon S3, Azure Blob Storage, Google
Amazon EBS, Azure Managed
Examples Cloud Storage
Disks, Google Persistent Disk

Networking in IaaS: VPC, Subnets, and Security Groups

Networking is a crucial component in Infrastructure as a Service (IaaS) environments. IaaS


providers, such as AWS, Azure, and Google Cloud, offer various networking services and concepts
to manage how virtual machines (VMs) communicate with each other, with the internet, and with
on-premises systems. Virtual Private Cloud (VPC), Subnets, and Security Groups are
fundamental building blocks of networking in IaaS. These components allow users to create
isolated network environments, divide resources into sub-networks, and control access to
resources.

1. VPC (Virtual Private Cloud)

A Virtual Private Cloud (VPC) is a logically isolated section of a cloud provider's network where
you can launch and manage your cloud resources, such as virtual machines, storage, and databases.
It’s essentially your own private network within the cloud environment. Within a VPC, you have
full control over the networking configuration, including IP address ranges, subnets, routing tables,
and network gateways.

VPCs allow users to:

 Control IP address ranges for resources in their virtual network.


 Define subnets to organize resources based on their function or security requirements.
 Use security controls to restrict traffic and manage access.
 Connect to the internet or on-premises data centers via VPNs or direct connections.
Key Features:

 Isolation: A VPC provides isolation from other users' networks, meaning that the resources
inside your VPC cannot communicate with resources in other VPCs unless explicitly
allowed.
 Customizable IP Ranges: When you create a VPC, you define its IP address range (CIDR
block), which determines the private IP addresses of all resources within that VPC.
 Private and Public Subnets: You can create both private and public subnets within a VPC.
Public subnets can have internet-facing resources (e.g., web servers), while private subnets
are for resources that don’t need direct internet access (e.g., databases).
 Peering and VPN Connections: VPCs can be connected to other VPCs (using VPC
Peering) or to on-premises networks via Virtual Private Networks (VPNs) or Direct
Connect in AWS.

2. Subnets

A Subnet (short for "subnetwork") is a smaller, logically segmented portion of a larger network
(such as a VPC). Subnets allow you to divide your VPC’s IP address range into smaller, more
manageable segments. By segmenting a VPC into subnets, you can better organize and secure
resources based on different criteria, such as function (e.g., web, app, database tiers) or security
needs.
Key Features:

 Private and Public Subnets:


o Public Subnets: Subnets with resources that require direct internet access (e.g.,
web servers, load balancers) can be routed through an internet gateway (IGW).
o Private Subnets: Subnets that house internal resources (e.g., databases, application
servers) that do not need direct access to the internet. These can route through a
NAT gateway or a VPN for outbound internet traffic.
 IP Address Allocation: Each subnet within a VPC is assigned a specific range of IP
addresses, which must be a subset of the larger VPC CIDR block. You can allocate
different IP ranges to different subnets based on your network design.
 Routing: Each subnet is associated with a route table, which controls the traffic flow
between the subnet and other parts of the network. For example, the route table for a public
subnet will have a route to the internet, while the route table for a private subnet may route
traffic to a NAT gateway for internet access.

3. Security Groups

Security Groups are virtual firewalls that control inbound and outbound traffic to cloud resources,
typically virtual machines (VMs), within a VPC. Security groups define rules based on IP address
ranges, port numbers, and protocols to allow or deny traffic. They are stateful, meaning if you
allow incoming traffic, the response is automatically allowed, regardless of outbound rules.
Key Features:

 Stateful: Security groups are stateful, which means that if an inbound request is allowed,
the corresponding outbound traffic is automatically allowed without needing to create a
separate rule for the outbound response.
 Rule-Based: You define security rules that specify allowed IP ranges (source and
destination), ports, and protocols (e.g., TCP, UDP, ICMP). For example, a rule could allow
incoming HTTP (port 80) traffic from any IP address.
 Association with Resources: Security groups can be associated with resources such as
EC2 instances, load balancers, and other network interfaces. A resource can have multiple
security groups associated with it, and rules from all associated security groups are applied
to the resource.
 Dynamic Updates: You can modify security group rules at any time, and changes are
applied immediately without needing to restart the associated resources.
 Outbound Rules: Security groups can control both inbound and outbound traffic. By
default, security groups allow all outbound traffic but restrict inbound traffic, except for
what is explicitly allowed.

For example, in a typical three-tier application architecture:

 The public subnet might contain the web servers, which need to be accessible from the
internet. These servers would be associated with security groups allowing inbound
HTTP/HTTPS traffic (ports 80 and 443).
 The private subnet could contain application servers and databases. The application
servers might need to communicate with the web servers, so they would be configured to
allow traffic from the web servers’ security groups. However, the database would be in a
private subnet with security groups allowing only the application servers to connect.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy