Module 4-1
Module 4-1
Models of Cloud Computing – Cloud Service Models – SaaS – PaaS – IaaS – Cloud
Deployment Models – Public, Private, Community and Hybrid Clouds – Cloud Storage
Cloud Data Centre – Cloud Data Centre Core Elements (Application, DBMS, Compute,
Storage and Network) – Storage Network Technologies – Cloud Backup – Cloud and
Disaster Recovery – Replication Technologies – Computing on Demand.
_____________________________________________________
Iaas
Paas
Saas
Software as a Service
Applications are hosted by a cloud vendor(supplier)
This is available to the customers through the Internet
The software is accessed at the customer’s location
One machine can serve many cloud users simultaneously(multitenant)
Applications of SaaS
Importance of SaaS
SaaS providers
NetSuite
Intuit
Financial Force.com
Coupa Software
AT &T
Platform as a Service
Uniqueness in PaaS
Application expansion: cloud user can customize the application as per requirement
Simplicity of use: user friendly . Drag and drop Integrated development environments
(IDE) are available.
Accessibility: an alternative platform is always available anywhere anytime
Scalability: the infrastructure can manage different application loads
Safety: only log on activities are provided
Comprehensiveness: application developed can be incorporated with other applications
Portability: applications can be shifted from one PaaS to another
Porting devices: for easy migration from on premise platform to online platform
Proper documentation: there is a properly documented API to document user
verification, recovery, savings of file etc.
Infrastructure as a service (IaaS)
It is the delivery of computer infra structure as a service
Cloud supplier provides computers as physical or virtual machines
Virtual machines are operated by hypervisor (Xen, Vmware)
Other IaaS resources are
Image sin Virtual machine image history, blocks of storage, software collections,
firewalls, IP addresses, VLANs
Cloud user deploy OS images on their application software and machine
Cloud supplier prepare bill based on usage only.
IaaS providers
Amazon
Rackspace
Gogrid
Symetriq
Private cloud:
Community cloud
Public cloud
Hybrid cloud
Private cloud
Private cloud services gives the control of cloud infra structure to the user
Infrastructure access is permitted to members of organization
Private cloud is hosted in the data centre of the company and services are offered to
users within the company
Higher cost compared to public cloud
A private cloud is possessed by the consumer, but constructed and deployed by a
third party
Physical servers may be positioned at the location of the consumer
Private clouds are owned by big organizations
Safety is stricter in private cloud than in public cloud. Because the infrastructure is
owned by the organization and the organization has control over the applications
installed.
Eg: Vmware, Microsoft, Eucalyptus with Ubuntu Server
Virtual private cloud: a consumer is allotted private cloud inside public cloud’s
physical infrastructure
Community cloud
Limited and consumed by means of a group or cluster who are engaged in a general task.
The members of the society get access to the information on the cloud. Community cloud
falls between public and private cloud. Cost is higher than public cloud.
Eg: Google Gov Cloud, NASA Nebula cloud
Hybrid Cloud
Hybrid cloud is a combination of two or more clouds, private, public and community
clouds
Cloud users are supplied with information on the public cloud and the cloud supplier
has to maintain the company significant services.
Hybrid cloud enables to migrate and manage workloads between these various cloud
environments
organizations choose to adopt hybrid cloud platforms to reduce costs, minimize risk,
and extend their existing capabilities to support digital transformation.
Cloud bursting is a configuration method that uses cloud computing resources
whenever on-premises infrastructure reaches peak capacity. When organizations run
out of computing resources in their internal data center, they burst the extra
workload to external third-party cloud services.
Cloud storage
Cloud storage is a service model where in data is maintained, controlled, and backed
up distantly and made accessible to users over the Internet.
It is a network of online storage hosted by third parties(cloud storage providers)
Companies who need to host data, take storage space on rental basis
Cloud storage is accessed through web based user interface or API
Node ports
Cables Connectors
Interconnecting devices
Storage arrays
The fibre channel fabric is a rational space wherein every joint converses with each other
via a switch or manifold unified FC switches.
Compute systems communicate with storage tools via specific vents known as ports.
Ports are the fundamental construction blocks of an FC network. In the network, ports
may be of different kinds as follows:
N_port - It is also called the node port. It is a compute system port host bus adaptor
(HBA) or a storage range port which is associated to a switch within a switched fibre.
E port - It is an FC port which develops the association between two FC switches. This
port is called the expansion port. The E port on an FC switch unites to the E port of other
FC switches in the network
F_port- It is a port on a switch which unites an N port. It is also defined as a fabric port.
G_port - It is a standard port which may function as an F port or an E port and decides
its functionality mechanically all through initialization.
World wide name and channel address are the two kinds of addresses which are used for
communication in an FC SAN situation.
Replication Technique
The procedure of generating an accurate/similar replica of data is known as replication.
The accurate copy of data that is generated is known as replica. Such replicas may be
used for revival in the occurrence of data loss.
The main aim of replication is to allow users to have the chosen data at the correct place,
in a condition suitable to the needs of revival.
Continuous replica: The data on the replica is matched with the manufacture data
during the entire period.
Point In Time: The data on the replica is a copied picture of the manufacture at a certain
timestamp.
Local replication is the procedure of replicating data inside a similar data center.
Local replication technologies may be categorized on the basis of the site where the
replication is carried out.
Compute-based : Replication is carried out using the resources of the CPU of the
computer system through software which is working on the compute system.
Compute-based regional replication may be more classified as file system snapshot and
logical volume management (LVM)- mirroring.
Storage array-based: Replication is carried out on the storage range by using the
resources of the CPU of the range via the operating environment of range.
Storage group-based regional replication may be classified follows:
Remote replicas assist corporations to improve the threats associated with regionally
determined disaster.
The infrastructure where the replica is saved at the isolated location is called target. Data
has to be shifted from the source location to the target location over several networks.
In a three-site replication, data from the source location is replicated to two remote
locations.
Cloud backup
Backup is a replica of the manufactured data, generated and maintained for the only
intention of improving corrupted or deleted data.
Corporations require backup data at a cheaper price with the least number of resources.
Corporations should guarantee that true data is in the correct place at the correct time.
Backup technologies need a guarantee successful execution of the revival and backup
solution.
Backups are carried out for three key reasons-documentation, operational restores, and
disaster recovery.
The backup replicas are used for reinstating data at an alternate location when the
primary location is harmed because of a catastrophe.
Operational backup is a backup of data at a point in time and is used to reinstate data in
the occurrence of data loss or rational corruptions which can happen during routine
procedures.
Documentation is a general prerequisite used to protect contract report, email, and other
e work goods for rigid approval.
Full backup is a backup of the total data on the manufactured amounts at point in time
and is generated by replication of the data on the manufacture amounts to a secondary
storage tool. This is much quicker, but takes longer to reinstate.
Cumulative backup imitates data has been distorted since the last full backup. This
technique takes more time than incremental back up but is quicker to reinstate.
Synthetic full backup is another kind of backup which is employed in executions where
the construction amount resources cannot be entirely set aside for a backup procedure for
expanded phases.
A backup system uses client server design - backup server and multiple backup
consumers.
The backup server controls the backup function sustains the backup list that restrains
information regarding the backup metadata and backup procedure. The backup server
relies on the backup consumers for collecting the data to be backed up. The consumers
may be native to the server or may occupy an additional server, apparently to back data
perceptible to that server.
The backup metadata has been obtained by the backup server from the backup
consumers to out its actions. The metadata is saved either locally inside the backup
server or outwardly in a range. The storage joint is accountable for writing data to the
backup tool. Characteristically, the storage joint is incorporated through the backup
server and both are hosted on a similar physical platform. The storage node is directly
connected to a backup device.
Disaster recovery
The Backup Server commences the back up procedure for distinct customers according
to the back up program organized for them.The backup server synchronizes the backup
procedure with all the constituents in a backup arrangement. The backup server sustains
the information regarding the backup consumers to be dealt with and the storage joints to
be employed in a backup function. The backup server recovers the backup-concerned
information from the backup list and, on the basis of this information initiates a suitable
storage joint to put in the backup media into the backup tools.
Concurrently, it initiates the backup consumers to transmit their metadata to the backup
server to back up the data to a suitable storage joint. On getting this demand, the backup
consumer transmits trailing information to the backup server. The backup server
inscribes this metadata on its backup list.
The backup consumer transmits the data to the storage joint, and the storage joint
inscribes the data the storage tool. The storage joint transmits trailing information to the
backup server as well in order maintain it updated regarding the media being employed
in the backup procedure. A reinstate procedue is manually commenced by the backup
consumer. Upon getting a restore demand, the user unlock the reinstate application in
order to analyse the consumer's record which has been backed up. Whils choosing the
consumer for which a reinstate demand has been made, the user also requires recognizing
the consumer who will obtain the reinstated data. Data may be reinstated on a similar
consumer or another consumer, given the appropriate consents, and then the user chooses
the data which is to be reinstated.
The reinstated application should communicate with the backup server as well. The
backup server recognizes the backup media needed for the reinstate and informs the
storage joint to put in the backup media. Then, the data is interpreted and transmitted to
the consumer which has been recognized to obtain the reinstated data.
Application
Compute:
Types of communication
Between user and compute system (by I/O tools)
Between storage and compute system (by host bus adapter or host regulator )
Plain laptops
Processor
Storage
Network