Cloud Unit 5
Cloud Unit 5
SOA and cloud, SOA and IAAS, cloud infrastructure benchmarks, OLAP, business intelligence, e-Business,
ISV, Cloud performance monitoring commands, issues in cloud computing. QoS issues in cloud, mobile
cloud computing, Inter cloud issues, Sky computing, Cloud Computing Platform, Xen Cloud Platform,
Eucalyptus, OpenNebula, Nimbus, TPlatform, Apache Virtual Computing Lab (vCL), Anomaly Elastic
Computing Platform.
UNIT V
SOA
Service Oriented
Architecture
PLATFORM PRACTICE
03 Increase 04 Employ best
Operational efficiency pracioe methology
Figure 5.1: SOA framework
sOA is a framework that allows business processes to deliver interoperability and rapid delivery of
functionality. It helps system-to-system integration by creating loosely coupled services that can be reused
for multiple purposes. The concept of SOA is similar to Object-Orientated Programming where objects are
generalized so that they can be reused for multiple purposes.
Similarities between Cloud Computing and SOA:
Reuse - Conceptually speaking, the idea of reuse is inherent both in Cloud Computing and SOA.
As needed basis In Cloud Computing, the services are provided to the user are on-demand and as
needed. SOA is similar to this since the system-to-system services are on-demand and as needed as
well.
Network Dependency - Cloud Computing and SOA both require an available and reliable network.
If a network does not exist then the cloud services provided over the Internet would not be
possible. Similarly, if a network does not exist then the communications between systems would
not be possible. Thus, both Cloud Computing and SOA are dependent on a network.
Cloud Contracts In Cloud Computing, contracts entail the mutual agreement between an
organization and cloud service providers. In cloud contracts, there is a cloud service provider and a
cloud service consumer (the organization). In the case of SOA, contracts are important and can be
either external (e.g., Yahoo! Pipes) and/or internal (e.g., organizational system integration). In SOA
Download
contracts, there are service producer(s) and service consumer(s) that are conceptually similar to
cloud contracts.
OLAP
OLAP (Online Analytical Processing) is the technology behind many Business Intelligence (BI) applications.
OLAP 0s a powerful technology for data discovery, including capabilities for limitless report viewing,
complex analytical calculations, and predictive "what if" scenario (budget, forecast) planning.
A Data warehouse would extract information from multiple data sources and formats like text files, excel
sheet, multimedia files, etc.
The extracted data is cleaned and transformed. Data is loaded into an OLAP server (or OLAP cube) where
information is pre-calculated in advance for further analysis.
Basic analytical operations of OLAP
Four types of analytical operations in OLAP are:
Roll-up
Drill-down
Slice and dice
" Pivot (rotate)
1) Roll-up: Roll-up is also known as "consolidation" or "aggregation." The Roll-up operation can be
performed in 2 ways
" Reducing dimensions
Climbing up concept hierarchy. Concept hierarchy is a system of grouping things based on their
order or level.
2) Drill-down: In drill-down data is fragmented into smaller parts. It is the opposite of the rollup process. It
can be done via
Moving down the concept hierarchy
Increasing a dimension
3) Slice: Here, one dimension is selected, and a new sub-cube is created.
Dice: This operation is similar a slice. The difference in dice is user select 2 or more dimensions that
result in the creation of a sub-cube.
4) Pivot: In Pivot, user rotate the data axes to provide a substitute presentation of data.
Types of OLAP:
Table 5.1: Types of OLAP
Type of OLAP Explanation
Desktop OLAP (DOLAP) In Desktop OLAP, a user downloads a part of the data from the
database locally, or on their desktop and analyze it.
Web OLAP (WOLAP) Web OLAP which is OLAP system accessible via the web browser.
WOLAP is a three-tiered architecture. It consists of three
components: client, middleware, and a database server.
Mobile OLAP: Mobile OLAP helps users to access and analyze OLAP data using
their mobile devices
BUSINESS INTELLIGENCE
Business intelligence (BI) combines business analytics, data mining, data visualization, data tools and
infrastructure, and best practices to help organizations to make more data-driven decisions. Business
intelligence (BI) comprises the strategies and technologies used by enterprises for the data analysis of
business information. BI technologies provide historical, curent, and predictive vievws of business
operations. Common functions of business intelligence technologies include reporting, online analytical
processing, analytics, data mining, process mining, complex event processing, business performance
management, benchmarking, text mining. predictive analytics, and prescriptive analytics. Bl technologies
can handle large amounts of structured and sometimes unstructured data to help identify, develop, and
otherwise create new strategic business opportunities. They aim to allow for the easy interpretation of
these big data. Identifying new opportunities and implementing an effective strategy based on insights can
provide businesses with a competitive market advantage and long-term stability.
Business intelligence can be used by enterprises to support a wide range of business decisions ranging
from operational to strategic. Basic operating decisions include product positioning or pricing. Strategic
business decisions involve priorities, goals, and directions at the broadest level. In all cases, BIis most
effective when it combines data derived from the market in which a company operates (external data) with
data from company sources internal to the business such as financial and operations data (internal data).
When combined, external and internal data can provide a complete picture which, in effect, creates an
"intelligence" that cannot be derived from any singular set of data. Among myriad uses, business
intelligence tools empower organizations to gain insight into new markets, to assess demand and
suitability of products and services for different market segments, and to gauge the impact of marketing
efforts.
E-BUSINESS
changing demand and scenarios of
Cloud Computing enables an e-commerce application to cater to the demand, traffic, and seasonal
to the
the market. It allows to upscale or downscale the services according
spikes. Cloud provides the few advantages that business needs as the business grows.
1. Scalability: Cloud hosting allows user to build his e-commerce presence as quickly
Provisioningmore servers
The scalability of the cloud perfectly complements the needs of the retail sector. the growth.
will slow down
on our own or securing the funds to build a bigger IT infrastructure
e-commerce site: traffic
2. Stability: New ad campaigns or a new product launch mean one thing for the
Prepare for those traffic
spikes. The power of cloud hosting provides superior stability for online retail.
of mind.
spikes by hosting the IT infrastructure in state-of-the-art data centers for peace on a
the e-commerce site is hosted
3. Speed: For any e-commnerce business, those are sobering statistics, if
infrastructure could
powerful cloud platform, then user will get benefited from speeds that no on-site
promise. A reliable e-commerce site will translate into positive sales for the business.
4. Savings: For SMEs who are beginning build their online presence and reputation, cloud computing
cloud hosting, profits can be
offers crucial savings. Because user only pays for what he need and use with
re-invested into creative ways to grow the business.
trusting that user
5. Security: Trust is foundational to the e-commerce model. Not only are customers
product, they are trust that their payment details and other information are
accurately describe the
transmitted securely.
ISV
run on one or more
An ISV (independent software vendor) makes and sells software products that
computer hardware or operating system (0S) platforms. ISVs typically provide software in conjunction
with
software producer builds
a hardware, software or cloud platform provider. In the case of hardware, a
software to run on a particular vendor or vendors' hardware platform and the OSes the platform supports.
embedding
An ISV may also incorporate software from a software platform provider into its offering by
database technology from Microsoft or Oracle.
Brand Legend
1 Brand App Stan or knd
Vendor Activity EMBT Acthvity Process
+
Aprove
Reject
Sunit te Store APP Challenge
Reject
APP
Publish
7. Vendor App Besie
L Publish App
Rrdew Congleted
3. AppDynamics
AppDynamics provides cloud-based network monitoring tools for assessing application performance and
of cloud
accelerating operations shift. User can use the system to maximize the control and visibility
applications in crucial laaS/PaaS platforms such as Microsoft Azure, Pivotal Cloud Foundry, and AWS.
AppDynamics competes heavily with other application management solutions such as SolarWinds,
Datadog, and New Relic.
The software enables users to learn the real state of their cloud applications down to the business
transaction and code level. It can effortlessly adapt to any software or infrastructure environment. The
new acquisition by Cisco Systems will only magnify AppDynamic's capabilities.
Costing Issue: The tradeoffs amongst computation, communication and integration must be
considered by cloud consumer. Infrastructure cost is reduced significantly while migrating from one cloud
model to other, but it raises data communication cost. For example, transferring organization's data cost to
and from community cloud to public cloud and the cost per unit of computing resources used will be
higher. Particularly this problem is prominent when consumer uses the hybrid cloud deployment model,
because in this model data is distributed among number of public, private or community clouds.
SLA Issue: While shifting the core business from one cloud model to another consumer need to
make sure the quality, availability, reliability and performance of the underlying resources. The
consumer needs to get guarantee from the service provider on service delivery. This guarantee is
given through service level agreements (SLAs). The issue lies in defining the SLAs; The SLA should be
written in such a way that it satisfies the consumers' expectations. It must maintain a balance between
expressiveness and complicatedness. Another issue is the different type of cloud will need different SLA
meta-specifications. This also raises many implementation issues for the service providers.
Migration Issue: According to the IDC survey which was conducted in 2008, when data of
organizations is shifted from one cloud to another there are some security or privacy issues. IT system
IT management and personal application are most easily moved. But organizations are less like
moving from IAAS to SaaS cloud, because marginal functions are out sourced to the reluctant in
cloud and core
activities are kept in house.
Predictable and unpredictable workloads: CPU, storage and network are all
cloud computing. Less power is required by these virtualized resources when virtualized resources in
type of data centers. Virtualized environment is made available to the user withcompared to conventional
the help of these virtual
machines (VMs). Large fluctuating workloads get allotted to these VMs. The load may
on (VMs) due to the growing demand of application. The workloads of be hugely increase
these types can be classified as
predictable and unpredictable workloads.
Homogenous and Heterogeneous Workload: In cloud there are basically two types
homogeneous and heterogeneous. Workdoad with similar type of configuration (i.e. ofnoworkloads
of
namely
RAM, storage and execution time required etc.) is called CPU required,
heterogeneous workload is managed and hosted by different resource homogeneous workload. However,
at different levels of configuration. So we have to vendors at the same level or
develop cloud system in such a way that it can
accommodate both type of workload.
Transactional workload and Batch workload: Transaction workload is
we required user input in case of transactional workload different from Batch workload, as
but in batch workload there is no need of
user input. Online transactional system is an example of
are pre-emptive whereas batch workload is transactional workload. Transactional workloads
but batch workload fluctuates. An efficient non-pre-emptive. Transactional workloads do not fluctuate
resource allocation algorithm is required to handle both these
type of workloads.
Flexibility: Flexibility in cloud means how the fluctuation
be handled dynamically. As the time in the requirement of the resources can
increases, demand of the resources may grow, these
must be automatically perceive by the cloud and demands
efficient resource management facility. should be enhanced. Acloud should have an
Maximization of Resource and minimization of costs:
minimize overall cost of operation are the two important The maximization of resource utilization and
should be provided by a robust cloud to its constraints in cloud. An uninterrupted service
users. For this purpose the cost of the service
should be kept
18:37 3.90 IYe
KB/S 4 73%
[s] 8 /13
The following factors are fostering the adoption of mobile cloud computing:
Trends and demands: customers expect the convenience of using companies' websites or
application from anywhere and at anytime. Mobile devices can provide this convenience. Enterprise
users require always-on access to business applications and collaborative services so that they can
increase their productivity from anywhere, even when they are on the commute.
Improved and increased broadband coverage: 3G and 4G along with WiFi, femto-cells, fixed
wireless and so on are providing better connectivity for mobile devices.
Enabling technologies: HTML5, Css3, hypervisor for mobile devices, cloudlets and Web 4.0 will
drive adoption of mobile cloud computing
INTER CLOUD ISSUES
The common issues in inter cloud are:
Interoperability and Portability
High Performance Heterogeneous Cloud Infrastructures
Distribution across locations
Security Mechanisms Across clouds
Network Management
Service Discovery &Composition
Business Process Management
Dynamic Configuration, Provisioning, and Orchestration of Cloud Resources
SKY COMPUTING
Sky Computing is an emerging computing model where resources from multiple clouds providers are
leveraged to create large scale distributed infrastructures. The characteristics of sky computing are:
Control on Resources: Sky computing allows users to control resources on their own. So trust
relationships within sky computing are the same as those within a traditional non distributed site,
simplifying how remote resources interact.
Scalability: It is dynamically scalable as resources are distributed over several clouds.
Security: When in sky computing we deploy a single appliance with a specific provider, we rely on
basic seaurity and contextualization measures this provider - specific networking & security
context. So security relationships are more complex requires provider independent methods to
establish a security & configuration context.
Applications: Seasonal e-commerce web server, event based alert systems etc
Working of Sky Computing
When a remote user leases a resource, the service provider turns control of that resource over to the user.
This change was enabled when a free and efficient virtualization solution is available. To construct a sky
virtual cluster using user level virtual network - Vine following steps are required.
1. Preparation:-obtain a ViNe image is available from the science cloud marketplace. This image is capable
of providing and integrating context information.
2. Deployment: - Start a ViNe VM in each site which provides virtual routers used as gateways by nodes
that do not run ViNe software. Start the desired number of compute VMs at each provider site. The
contextualized images are configured to automatically (securely) contact the context broker to provide
use VRs to reach nodes
appropriate networking and security information and adjust network routes to
different provider sites so that all
crossing site boundaries. The configuration exchange includes VMs on
VMS can behave as a single virtual cluster.
into the virtual
3. Usage:-Upload inputs and start the desired application (typically, by simply logging
cluster and using a command-line interface).
describes the VN
4. Routing :- It requires two table as a) Local network description table (LNDT) - which
for which a VR is
membership of a node, b)GIlobal network description table - which describes sub network
responsible.
NAEUS
ABICLOLI
PLATFOFE
EUCALT
PATFORN
OPEN
BSULA
eed C? Host
Prhate Claul
SCP Host
Saster SCP
Shured Srage
EUCALYPTUS
systems. It is
Eucalyptus stands by Elastic Utility Computing Architecture for linking the programs to useful
mainly based on private cloud and was developed by California University, Santa Barbara. Basically, it is an
to perform many
open source computing environment framework. By using eucalyptus, users are able
can be used without
functions like start, control, shut down, cleaning of virtual machines etc. Eucalyptus
requiring resources and further demands minimum modification and maximum extension. It also
virtual network that isolates network traffic of various users. Figure shows the Eucalyptus provides
architecture.
Cht APL
Cload Cool
Cut
Eucalyptus platform has four basic components namely node controller, cluster controller, storage
controller and cloud controller. Node Controller runs on each and every node and is responsible for
handling queries requested by other users. It also stores the other information like state of instances of
VMs. Cluster Controller controls all the nodes that are interconnected form a virtual cluster and collects
the information from VM and schedule its extension. Storage Controller is responsible for storing images
stored on virtual machines so that these may be accessed in future. Cloud Controller is basically manager
of this cloud. It is responsible for all the queries i.e. making decisions and implementing them.
OPENNEBULA
This platform can be used on public, private as well as hybrid cloud. It follows the framework of open
source cloud service. The biggest advantage of using Open Nebula platform is that it can dynamically
extend the infrastructure of any user i.e. the data centers or clusters can be set to make them their
infrastructure property flexible. Storage, network and virtual techniques can easily by synchronize. It
basically includes three technologies i.e. virtualization, storage and network. Open Nebula offers various
advantages such as adjustable platform meeting the dynamic requirements of the users, centralized
management of virtually and physically distributed infrastructure, efficient energy consumption, cost
reduction and so on. The architecture of Open Nebula is shown below in figure.
Cloud Us
Maegemenr Layr
Claul Duvs
Cloud Brokes
Workspace Seryces
TPLATFORM
This platform is based on PaaS and used to developed web mining applications. The architecture of
TPlatform comprises of three layers as shown in figure. PC Cluster layer supports the harcware
infrastructure being used in data processing.
Data Procesuns Applscatioris
Map Reduce
Big Table
TES
PC PC
Chustes Claste
Clustes Cluster
HORNE
New Reservation
New Reservation
Current Reserations
Blcck Alocations
Peess sclect the esvicnnent ycu wert ie uas fronthe list
AA Workataton 64 SASEWForecast Wir200s
User Preferences Ceni00 G3 Base (G4 ot VI)
Stetistics AA VChstaton sé4 sASEMFOrecast Va2ncs
Documentation Vstab 0100 Wn/ VW)
Logoat Ubustu 12 10 (VM B4t)
WedoweT Base (54 ot VIt)
Duratoe:1hour
Create Resevaion
Behind the scenes, the scheduling components built into the web portal determine which compute
resources to assign to the reservations. The requested environment is then dynamically provisioned,
secured, and configured allow remote access by the user. The user then remotely connects to the
remote compute environment using remote desktop, SSH, or any of the other supported protocols.
ANOMALY ELASTIC COMPUTING PLATFORM
Anomaly Elastic Cloud Computing Platform (ECP) allows its users to deliver infrastructure-as-a-Service
functionality. Equipped with an intuitive self-service interface, ECP is focused on helping its users build and
deploy applications instead of manage them.
Anomaly Elastic Cloud Computing Platform Key Features:
Self-service interface
Automated APl provisioning
Global scalability
Carrier-class architecture
Built-in firewalls
[Link] marketplace
Modifies offline VM images
Customer-facing API
Various hypervisors