0% found this document useful (0 votes)
98 views52 pages

Unit2 - Cloud Enabling Technologies

The document discusses cloud enabling technologies, focusing on broadband networks, data center technology, virtualization, web technology, and multitenant technology. It outlines the architecture of broadband networks, the importance of data centers for centralized IT resources, and the role of virtualization in optimizing hardware usage. Key concepts include internetworking architecture, network bandwidth, latency, and the benefits of automation and standardization in data centers.

Uploaded by

Sindhu Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views52 pages

Unit2 - Cloud Enabling Technologies

The document discusses cloud enabling technologies, focusing on broadband networks, data center technology, virtualization, web technology, and multitenant technology. It outlines the architecture of broadband networks, the importance of data centers for centralized IT resources, and the role of virtualization in optimizing hardware usage. Key concepts include internetworking architecture, network bandwidth, latency, and the benefits of automation and standardization in data centers.

Uploaded by

Sindhu Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cloud Enabling Technologies

Manash Kumar Mondal

Rani Rashmoni Green University

Code: MSCCS401

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 1 / 52


Contents

1 Broadband Networks and Internet Architecture

2 Data Center Technology

3 Virtualization technology

4 Web Technology

5 Multitenant Technology

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 2 / 52


Broadband Networks and Internet Architecture

Broadband Networks and Internet Architecture

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 3 / 52


Broadband Networks and Internet Architecture

Broadband Networks and Internet Architecture

All clouds must be connected to a network. This inevitable requirement


forms an inherent dependency on internetworking.
Established and deployed by ISPs, the Internet s largest backbone networks
are strategically interconnected by core routers that connect the world s
multinational networks.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 4 / 52


Broadband Networks and Internet Architecture

ISP Internetworking

Figure: ISP Internetworking


M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 5 / 52
Broadband Networks and Internet Architecture

Internetworking Architecture

The communication links and routers of the Internet and ISP networks are IT
resources
That are distributed among countless traffic generation paths.
Two fundamental components used to construct the internetworking
architecture.
Connectionless packet switching (datagram networks)
Router-based interconnectivity

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 6 / 52


Broadband Networks and Internet Architecture

Connectionless Packet Switching (Datagram Networks)

End-to-end (sender-receiver pair) data flows are divided into packets of a


limited size
Packets are received and processed through network switches and routers,
then queued and forwarded from one intermediary node to the next
Each packet carries the necessary location information, such as the IP or
MAC address, to be processed and route

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 7 / 52


Broadband Networks and Internet Architecture

Ruter-based interconnectivity

A router is a device that is connected to multiple networks through which it


forwards packets.
Even when successive packets are part of the same data flow, routers process
and forward each packet individually while mainintaining the network
topology information that locates the next node on the communication path
between the source and destination nodes.
Routers manage network traffic and gauge the most efficient hop for packet
delivery, since they are privy to both the packet source and packet destination.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 8 / 52


Broadband Networks and Internet Architecture

Router-based Interconnectivity

Figure: Packets traveling through the Internet are directed by a router that arranges
them into a message

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 9 / 52


Broadband Networks and Internet Architecture

Internet Reference model and Protocol Stack

Figure: A generic view of the Internet reference model and protocol stack

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 10 / 52


Broadband Networks and Internet Architecture

Internetworking of a Private Cloud

The physical IT resources that constitute the cloud are located and managed
within the organization

Figure: The internetworking architecture of a private cloud.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 11 / 52


Broadband Networks and Internet Architecture

Internetworking architecture of an Internet-based cloud


deployment model

The Internet is the connecting


agent between non-proximate
cloud consumers, roaming
end-users, and the cloud
provider s own network..

Figure: Internetworking architecture of


anInternet-based cloud deployment model

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 12 / 52


Broadband Networks and Internet Architecture

On-Premise IT resources Vs.Resources

Figure: A comparison of on-premise and cloud-based internetworking.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 13 / 52


Broadband Networks and Internet Architecture

Network bandwidth and Latency

Network bandwidth
End-to-end bandwidth is determined by the transmission capacity of the shared
data links that connect intermediary nodes.

Latency
Also referred to as time delay, latency is the amount of time it takes a packet to
travel from one data node to another. Latency increases with every intermediary
node on the data packet’s path.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 14 / 52


Broadband Networks and Internet Architecture

Cloud Carrier and Cloud Provider Selection

The service levels of Internet connections between cloud consumers and cloud
providers are determined by their ISPs, which are usually different and
therefore include multiple ISP networks in their paths.
QoS management across multiple ISPs is difficult to achieve in practice,
requiring collaboration of the cloud carriers on both sides to ensure that their
end-to-end service levels are sufficient for business requirements.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 15 / 52


Data Center Technology

Data Center Technology

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 16 / 52


Data Center Technology

Data Center Technology

Grouping IT resources in close proximity with one another, rather than having
them geographically dispersed.
Modern data centers are specialized IT infrastructure used to house
centralized IT resources, such as
servers,
databases,
networking and telecommunication devices, and
software systems.

Advantages
power sharing,
higher efficiency in shared IT resource usage, and
improved accessibility

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 17 / 52


Data Center Technology

Technologies and components

Virtualization
Standardization and Modularity
Automation
Remote Operation and Management
High Availability
Security-aware design, operation and management
Facilities
Computing hardware
Storage hardware
Network hardware

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 18 / 52


Data Center Technology

Virtualization

The common components of a


data center working together to
provide virtualized IT resources
supported by physical IT
resources.

M.K.Mondal ([email protected]) Figure: Virtualization


Rani Rashmoni Green University M.Sc CS. 2025 19 / 52
Data Center Technology

Standardization and Modularity

Data centers are built upon standardized commodity hardware and designed
with modular architectures, aggregating multiple identical building blocks of
facility infrastructure and equipment to support scalability, growth, and
speedy hardware replacements.
Modularity and standardization are key requirements for reducing investment
and operational costs as they enable economies of scale for the procurement,
acquisition, deployment, operation, and maintenance processes

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 20 / 52


Data Center Technology

Automation Management

Automation
Data centers have specialized platforms that automate tasks like provisioning,
configuration, patching, and monitoring without supervision to enable
self-configuration and self-recovery.

Automation
-Most of the operational and administrative tasks of IT resources in data centers
are commanded through the network s remote consoles and management
systems.
Physical visit is only required to perform equipment handling and cabling or
hardware-level installation and maintenance.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 21 / 52


Data Center Technology

High Availability

Designed to operate with increasingly higher levels of redundancy to sustain


availability.
Usually have redundant, uninterruptable power supplies, cabling, and
environmental control subsystems in anticipation of system failure, along with
communication links and clustered hardware for load balancing.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 22 / 52


Data Center Technology

Facilities

Facilities are custom-designed locations that are outfitted with specialized


computing, storage, and network equipment.
These facilities have several functional layout areas, as well as various power
supplies, cabling, and environmental control stations that regulate heating,
ventilation, air conditioning, fire protection, and other related subsystems.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 23 / 52


Data Center Technology

Security-Aware Design, Operation, and Management

Centralized structures that store and process business data


Thorough physical and logical access controls and data recovery strategies

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 24 / 52


Data Center Technology

Computing Hardware

Rackmount form factor server design composed of standardized racks with


interconnects for power, network, and internal cooling
Support for different hardware processing architectures, such as x86-32bits,
x86-64, and RISC
A power-efficient multi-core CPU architecture that houses hundreds of
processing cores in a space as small as a single unit of standardized racks
Redundant and hot-swappable components, such as hard disks, power
supplies, network interfaces, and storage controller cards

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 25 / 52


Data Center Technology

Storage Hardware

Hard Disk Arrays - implemented using redundant arrays of independent disks


(RAID) schemes
I/O Caching
Hot-Swappable Hard Disks
Storage Virtualization
Fast Data Replication Mechanisms

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 26 / 52


Data Center Technology

Categories of Storage Devices

Direct-attached storage (DAS)


A storage system directly connected to the computing IT resource using a host
bus adapter (HBA).

Network Storage
A storage system is connected to one or more IT resources through a network

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 27 / 52


Data Center Technology

Network Storages

Storage Area Network (SAN)


Physical data storage media are connected through a dedicated network,
Block-level data storage access
Industry standard protocols, such as the Small Computer System Interface
(SCSI)

Network-Attached Storage (NAS)


Hard drive arrays are contained and managed by this dedicated device
File-centric data access protocols like the Network File System (NFS) or
Server Message Block (SMB)

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 28 / 52


Data Center Technology

Network Hardware

Require extensive network hardware to enable multiple levels of connectivity.


Five network subsystems
Carrier and External Networks Interconnection
Web-Tier Load Balancing and Acceleration
LAN Fabric
SAN Fabric
NAS Gateways

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 29 / 52


Virtualization technology

Virtualization technology

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 30 / 52


Virtualization technology

Virtualization

Virtualization
Virtualization is the process of converting a physical IT resource into a virtual IT
resource.

Servers A physical server can be abstracted into a virtual server.


Storage A physical storage device can be abstracted into a virtual storage
device or a virtual disk.
Network Physical routers and switches can be abstracted into logical
network fabrics, such as VLANs.
Power A physical UPS and power distribution units can be abstracted into
what are commonly referred to as virtual UPSs.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 31 / 52


Virtualization technology

Characteristics

Both the guest operating system and the application software running on the
virtual server are unaware of the virtualization process
Uniform execution of programs on virtual systems as they would on physical
systems
Host or physical host the physical server on which Virtualization software
runs on
The virtualization software functionality encompasses system services that are
specifically related to virtual machine management - virtual machine manager
or a virtual machine monitor (VMM) or hypervisor.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 32 / 52


Virtualization technology

Hardware Independent

Virtualization is a conversion process that translates unique IT hardware into


emulated and standardized software-based copies.
Virtual servers can easily be moved to another virtualization host
Automatically resolving multiple hardware-software incompatibility issues
Cloning and manipulating virtual IT resources is much easier than duplicating
physical hardware.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 33 / 52


Virtualization technology

Server Consolidation

Allows multiple virtual servers to be simultaneously created in the same


virtualization host
Enables different virtual servers to share one physical server
Used to increase hardware utilization, load balancing, and optimization of
available IT resources
Flexibal - different virtual servers can run different guest operating systems
on the same host
Supports on-demand usage, resource pooling, elasticity, scalability, and
resiliency

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 34 / 52


Virtualization technology

Resource Replication

Created as virtual disk images that contain binary file copies of hard disk
conteny
Virtual disk images are accessible to the host s operating system
Copy, move, and paste, can be used to replicate, migrate, and back up the
virtual server

Advantages
Pre-packaging in virtual disk images in support of instantaneous deployment
Increased agility in the migration, rapidly scale out and up
Roll back, creation of VM snapshots by saving the state of the virtual server
s memory and hard disk image to a host-based file
Efficient backup and restoration procedures

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 35 / 52


Virtualization technology

Operating System-Based Virtualization

The installation of virtualization software in a pre-existing operating system,


which is called the host operating system
Needs to use this application to generate and operate one or more virtual
servers
Operating system virtualization can rectify hardware compatibility issues
Hardware IT resources can be used more flexibly
Virtualization software translates hardware IT resources that require unique
software for operation into virtualized IT resources that are compatible with a
range of operating systems

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 36 / 52


Virtualization technology

Operating System-Based Virtualization

Figure: Operating System-Based Virtualization

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 37 / 52


Virtualization technology

Operating System-Based Virtualization: Issues

The host operating system consumes CPU, memory, and other hardware IT
resources
Hardware-related calls from guest operating systems need to traverse several
layers to and from the hardware, which decreases overall performance.
Licenses are usually required for host operating systems, in addition to
individual licenses for each of their guest operating systems.
The processing overhead required to run the virtualization software and host
operating systems.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 38 / 52


Virtualization technology

Hardware-Based Virtualization

The installation of virtualization software directly on the physical host


hardware, bypassing the host operating system
Allowing the virtual servers to interact with hardware without requiring
intermediary action from the host operating system - efficient

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 39 / 52


Virtualization technology

Hardware-Based Virtualization

Figure: Hardware-Based Virtualization

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 40 / 52


Virtualization technology

Hypervisor

It has a simple user-interface that requires a negligible amount of storage


space
A thin layer of software
Handles hardware management functions to establish a virtualization
management layer
Device drivers and system services are optimized for the provisioning of
virtual servers
Used to optimize performance overhead inherent to the coordination that
enables multiple virtual servers to interact with the same hardware platform
Many standard operating system functions are not implemented
Might have compatibility with hardware devices

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 41 / 52


Virtualization technology

Virtualization Management

Many administrative tasks can be performed more easily using virtual servers
Modern virtualization software provides several advanced management
functions that can automate administration tasks and reduce the overall
operational burden on virtualized IT resources
VIM tools collectively manage virtual IT resources
Relies on a centralized management module, otherwise known as a controller,
that runs on a dedicated computer
VIMs are commonly encompassed by the resource management system
mechanism

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 42 / 52


Web Technology

Web Technology

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 43 / 52


Web Technology

Basic Web Technology

Used as both the implementation medium and the management interface for
cloud services
WWW a system of interlinked IT resources that are accessed through the
Internet
Main Components:
Web browser client
Web server
proxies, caching services, gateways, and load balancers, are for improving
scalability and security
Additional components reside as a layered architecture between the client and
the server
URL, HTTP, HTML/XML, Hypermedia

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 44 / 52


Web Technology

Web Applications

Distributed application
Uses Web-based technologies
Relies on Web browsers for the presentation of user-interfaces
These applications can be found in all kinds of cloud-based environments due
to their high accessibility.
PaaS ready-made environments enable cloud consumers to develop and
deploy Web applications
separate instances of the Web server, application server, and data storage
server environments

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 45 / 52


Web Technology

Web Applications

Figure: Web Applications

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 46 / 52


Multitenant Technology

Multitenant Technology

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 47 / 52


Multitenant Technology

Multitenant Applications

Designed to enable multiple users (tenants) to access the same application


logic simultaneously
Each tenant has its own view of the application that it uses, administers, and
customizes
A dedicated instance of the software
Remaining unaware of other tenants that are using the same application
Ensure that tenants do not have access to data and configuration information
of other tenants

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 48 / 52


Multitenant Technology

Multitenant Applications

Customizable features

User Interface Data Model


Business Process Access Control

Characteristics of multitenant applications

Usage Isolation
Scalability
Data Security
Metered Usage
Recovery
Data Tier Isolation
Application Upgrades

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 49 / 52


Multitenant Technology

Multitenant Applications: Example

Figure: Multitenant Applications: Example

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 50 / 52


Multitenant Technology

Multitenancy vs. Virtualization

Multitenancy
Multiple virtual copies of the server Virtualization
environment can be hosted by a
A physical or virtual server hosting
single physical server.
an application is designed to allow
Each copy can be provided to usage by multiple different users.
different users, can be configured
Each user feels as though they have
independently, and can contain its
exclusive usage of the application.
own operating systems and
applications.

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 51 / 52


Acknowledgement

Thank you!

M.K.Mondal ([email protected]) Rani Rashmoni Green University M.Sc CS. 2025 52 / 52

You might also like