Cloud Computing - Notes
Cloud Computing - Notes
Cloud Computing - Notes
• Security in shared resources and shared access of data centers also pose
another design challenge 2
• The provisioning tool carves out the cloud system to deliver the requested
service.
• Web service providers offer special APIs that enable developers to exploit
Internet clouds.
• Monitoring and metering units are used to track the usage and performance
of provisioned resources. 5
• Software must detect the status of each node server joining and leaving,
and perform relevant tasks accordingly.
• Cloud computing providers, such as Google and Microsoft, have built a large
number of data centers all over the world.
• The location of the data center is chosen to reduce power and cooling costs.
• Thus, the data centers are often built around hydroelectric power.
• The platform should be able to assure users that they have scalability,
dependability, and security protection.
• Service applications in this layer include daily office management work, such
as information retrieval, document processing, and calendar and
authentication services.
• All cloud services are not restricted to a single layer. Many applications may
apply resources at mixed layers.
• SaaS demands the most work from the provider, PaaS is in the middle, and 10
IaaS demands the least.
• The SLA resource allocator acts as the interface between the data center/cloud
service provider and external users/brokers.
• It also needs the latest status information regarding resource availability (from the
VM Monitor mechanism) and workload processing (from the Service Request
Monitor mechanism) in order to make resource allocation decisions effectively. 13
• The VM Monitor mechanism keeps track of the availability of VMs and their
• The Service Request Monitor mechanism keeps track of the execution progress of
service requests.
14
• QoS requirements cannot be static and may change over time due to
continuing changes in business operations and operating environments.
• The state of the art in cloud computing has no or limited support for
dynamic negotiation of SLAs between participants and mechanisms for
automatic allocation of resources to multiple competing requests.
• As the VMs are the containers of cloud services, the provisioning tools
will first find the corresponding physical machines and deploy the VMs to
those nodes before scheduling the service to run on the virtual nodes.
• The user will not care about the computing resources that are used for
providing the services.
• The virtualized infrastructure (black box in the middle) is built with many
virtualizing integration managers.
18
19
• Among all the clone VMs, only one needs to be active. The remote VM
• Only updated data and modified states are sent to the suspended VM to
update its state.
21
• Some utility computing services offer SaaS providers the opportunity to
defend against DDoS attacks by using quick scale-ups.
• So customers cannot easily extract their data and programs from one site
to run on another.
• Many nations have laws requiring SaaS providers to keep customer data
and copyrighted material within national boundaries.
23
• In a cloud environment, newer attacks may result from hypervisor
malware, guest hopping and hijacking, or VM rootkits
• Active attacks may manipulate kernel data structures which will cause
major damage to cloud servers.
• Multiple VMs can share CPUs and main memory in cloud computing, but
I/O sharing is problematic.
24
• A storage system should not only meet this growth, but also combine it
with the cloud advantage of scaling arbitrarily up and down on demand.
27
• The package supports virtual appliances to span more than one VM.
28
• Cloud providers want legal liability to remain with the customer, and vice
versa.
• Google pioneered cloud services in Gmail, Google Docs, and Google Earth
• GAE enables users to run their applications on a large number of data centers
associated with Google’s search engine operations. 31
• GFS is used for storing large amounts of data. MapReduce is for use in
application program development.
• Third-party application providers can use GAE to build cloud applications for
providing services.
33
• The frontend is an application framework which is similar to other web
application frameworks such as ASP, J2EE, and JSP.
• If you exceed the quota, the page instructs you on how to pay for the service.
• The platform does not provide any IaaS services, unlike Amazon, which offers
• This model allows the user to deploy user-built applications on top of the
cloud infrastructure that are built using the programming languages and
software tools supported by the provider (e.g., Java, Python).
• Well-known GAE applications include the Google Search Engine, Google Docs,
Google Earth, and Gmail.
• Users can interact with Google applications via the web interface provided by
each application.
• GAE also provides Google-specific services, such as the Gmail account service
36
• Amazon has been a leader in providing public cloud services and applies the
IaaS model in providing its services.
37
• SQS stands for Simple Queue Service, and its job is to ensure a reliable
message service between two processes.
• Amazon offers queuing and notification services (SQS and SNS), which are
implemented in the AWS cloud.
• Azure manages all servers, storage, and network resources of the data center.
• On top of the infrastructure are the various services for building different
• Live service - Users can visit Microsoft Live applications and apply the data
involved across multiple machines concurrently.
• The Azure platform applies the standard web communication protocols SOAP
and REST.
• The Azure service applications allow users to integrate the cloud application 42
with other platforms or third-party clouds.
• Eucalyptus:
• The system has been extended to support the development of both the
compute cloud and storage cloud.
• Any user can bundle her own root file system, and upload and then register
this image and link it with a particular kernel and ramdisk image.
• This image is uploaded into a user-defined bucket within Walrus, and can be
• This allows users to create specialty virtual appliances and deploy them
within Eucalyptus with ease.
44
• A set of open source tools that together provide an IaaS cloud computing
solution.
• It is compatible with the Amazon S3 REST API, but extends its capabilities by
including features such as quota management. 45
• Resource pool mode –Default mode, the service has direct control of a pool
of VM manager nodes and it assumes it can start VMs.
• Pilot mode - Here, the service makes requests to a cluster’s Local Resource
Management System (LRMS) to get a VM manager available to deploy VMs.
• OpenStack Compute is the internal fabric of the cloud creating and managing
large groups of virtual private servers.
• The API Server receives HTTP requests from boto, converts the commands to
and from the API format, and forwards the requests to the cloud controller.
• Six layers of cloud services, ranging from hardware, network, and collocation
to infrastructure, platform, and software applications.
• The top three service layers are SaaS, PaaS, and IaaS, respectively.
• The cloud platform provides PaaS, which sits on top of the IaaS infrastructure.
• The next layer is for interconnecting all the hardware components, and is
simply called Network as a Service (NaaS).
51
53
• Each layer has its own purpose and provides the interface for the upper layers
just as the traditional software stack does.
• Using VMs, the platform can be flexible, that is, the running services are not
bound to specific hardware platforms. This brings flexibility to cloud
computing platforms.
• The software layer on top of the platform is the layer for storing massive
amounts of data. This layer acts like the file system in a traditional single 54
machine.
• The distributed scheduler for the cloud application has special characteristics
that can support cloud applications, such as scheduling the programs written
in MapReduce style.
• The runtime support system keeps the cloud cluster working properly with
high efficiency.
55
• The SaaS model provides the software applications as a service, rather than
letting users purchase the software.
• On the provider side, costs are rather low, compared with conventional
hosting of user applications.
• The customer data is stored in the cloud that is either vendor proprietary or a
publicly hosted cloud supporting PaaS and IaaS
56
• The SLAs must commit sufficient resources such as CPU, memory, and
bandwidth that the user can use for a preset period.
• In the EC2 platform, some predefined VM templates are also provided. Users
can choose different kinds of VMs from the templates.
58
• The user may give up the service by canceling the demand, resulting in reduced
revenue for the provider.
• Both the user and provider may be losers in resource provisioning without 59
elasticity.
• When a resource has surpassed a threshold for a certain amount of time, the
scheme increases that resource based on demand.
• This method is easy to implement. The scheme does not work out right if the
workload changes abruptly.
61
• Otherwise, wasted resources are even greater due to events that do not 63
follow a fixed pattern.
• The scheme anticipates increased traffic with popularity. Again, the scheme
has a minimal loss of QoS, if the predicted popularity is correct.
64
• The figure shows the interactions among VM managers for cloud creation and
• The managers provide a public API for users to submit and control the VMs.
• The administrator can update, add, and delete templates at any time.
• This descriptor contains the same fields as the template and additional 67
information related to a specific VM instance.