0% found this document useful (0 votes)
3 views

CS802(B) UNIT 1

The document provides an overview of Service Oriented Architecture (SOA) and its components, including its history, features, advantages, and disadvantages. It discusses web services, specifically SOAP, UDDI, WSDL, and RESTful web services, highlighting their roles in communication and data exchange in cloud computing. Additionally, it introduces Software as a Service (SaaS) as a model for delivering software applications over the internet without local installation.

Uploaded by

Raj Thakur
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

CS802(B) UNIT 1

The document provides an overview of Service Oriented Architecture (SOA) and its components, including its history, features, advantages, and disadvantages. It discusses web services, specifically SOAP, UDDI, WSDL, and RESTful web services, highlighting their roles in communication and data exchange in cloud computing. Additionally, it introduces Software as a Service (SaaS) as a model for delivering software applications over the internet without local installation.

Uploaded by

Raj Thakur
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Scanned with ACE Scanner

CS802 (B) Cloud Computing AIST SAGAR

LECTURE 1 [UNIT-I]

Service Oriented Architecture (SOA)

The Service Oriented Architecture is an architectural design which includes collection of


services in a network which communicate with each other. The complication of each service is
not noticeable to other service. The service is a kind of operation which is well defined, self
contained that provides separate functionality such as checking customer account details,
printing bank statements etc and does not depend on the sate of other services.

History

The first report published on SOA by the analysts Roy W.Schulte and YefimV.Natis in 1996.

Why to use SOA?

 SOA is widely used in market which responds quickly and makes effective changes
according to market situations.
 The SOA keep secret the implementation details of the subsystems.
 It allows interaction of new channels with customers, partners and suppliers.
 It authorizes the companies to select software or hardware of their choice as it acts as
platform independence.

Features

 SOA uses interfaces which solves the difficult integration problems in large systems.
 SOA communicates customers, providers and suppliers with messages by using the
XML schema.
 It uses the message monitoring to improve the performance measurement and detects the
security attacks.
 As it reuses the service, there will be lower software development and management
costs.

Advantages

 SOA allows reuse the service of an existing system alternately building the new system.
 It allows plugging in new services or upgrading existing services to place the new
business requirements.
 It can enhance the performance, functionality of a service and easily makes the system
upgrade.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 1
CS802 (B) Cloud Computing AIST SAGAR

 SOA has capability to adjust or modify the different external environments and large
applications can be managed easily.
 The companies can develop applications without replacing the existing applications.
 It provides reliable applications in which you can test and debug the independent
services easily as compared to large number of code.

Disadvantages

 SOA requires high investment cost (means large investment on technology, development
and human resource).
 There is greater overhead when a service interacts with another service which increases
the response time and machine load while validating the input parameters.
 SOA is not suitable for GUI (graphical user interface) applications which will become
more complex when the SOA requires the heavy data exchange.

Description
The SOA blueprint contains some following goals:
 Requirements of design principles
 Specific tasks of design principles
 Interaction of services
 Details of integration scenario
 Templates for the specific tasks

SOA Blueprints Concepts


The following figure shows SOA blueprint with different concpets:

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 2
CS802 (B) Cloud Computing AIST SAGAR

Fig 1: SOA Blueprints

Considerations in SOA
There are some considerations must be covered in SOA:

Infrastructure

 Accessible of requirements
 Performance requirements
 Platform for system

Architecture

 Models of domain and service


 Organization of services
 Process of integrating the structure
 Quality of the service
 Message exchange patterns

Development

 Design guidelines for project development


 Required tools for project
 Validation and modification required things

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 3
CS802 (B) Cloud Computing AIST SAGAR

 Handling errors
 Security for service access

Administration

 Managing and building


 Testing and deploying the project
 Location of data stored and registering the application
Business Activity Monitoring(BAM)

The business activity monitoring functionality can be used by the products to display the
runtime details in the graphical system. The BAM products includes adapters or sensors which
are used to access the data using the Java, PL/SQL and other languages.
View Layer

The view layer provides two types of applications; one is RichClient application and another
one is WebClient application. The rich client application processes the data on the client side
and contains some locally installed programs little network resources dependance. The web
client is a client server side component which contains applications running on user's computer
and connected to server.
Application Server

The application server includes some functionalities such as workflow, rules, registry, CEP,
ESB, services and systems.
Workflow

The workflow is used when there is an interaction between human and implementation which is
done through the XPDL (XML Process Definition Language). The BPEL (Business Process
Execution Language) was used for runnable processes. When there is an upgrade in human
interaction feature by using the WS-HumanTask and WS-BPEL4People specifications, results
in blur boundaries of automated service calls.
Rules

The rules can be modified or changed commonly at run time when they are not incorporated in
the system. You can define the rules which are based on the system or natural language, before
becoming accessible by using the interfaces such as Java, Web service etc. The products
contains rules like JBoss rules, WebSphere ILOG rules, Visual rules and Oracle business rules.
CEP

The CEP stands for Complex Event Processing which allows to browse event streams based on
the certain pattern which can be uncorrelated in time or content. The Continuous Query

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 4
CS802 (B) Cloud Computing AIST SAGAR

Language (CQL) language contains SQL-style query language which attaches the elements for
organizing the data streams to the SQL language constructs.
ESB

The ESB stands for Enterprise Service Bus which gives patterns that are liable for the tasks and
ranges from routing to reachability, allow the interaction between message and protocol
transformation and manages the SOA environment. The ESB is placed between service provider
and consumer which is used for service virtualization. The services and systems are attached to
the ESB.

Description
The service is a kind of operation which is well defined, self contained that performs a specific
task.
The following figure shows SOA service categories:

Fig 2: SOA service categories

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 5
CS802 (B) Cloud Computing AIST SAGAR

LECTURE 2 [UNIT-I]

WEB SERVICES:
The service can be categorized into following ways:

Entity Service
The entity services include entities of customer such as purchase order, insurance policy,
invoice of order, ordered date etc in which you can perform CRUD operations such as Create,
Read, Delete and Update on the entities. These services provide information of the business
process stored in the databases and handle the business entities.

Task Service
The task service adds the business logic to other services and due to its focus on business entity,
it contains low amount of reusability. Task services provide operations on more than one entity
such as customer purchase order, creating purchase order number, validating customer details
etc. A service is called as task service when it needs to access the multiple entities.

Utility Service
The utility services are technology oriented services which are used to build larger and higher
level services and provides other capabilities which are unrelated to the message transfer. The
utility services provide reusable functions such as event logging, creating unique number and
notification etc to the other functional domains. These services contain small, closely packed
services which are used as building blocks in service oriented system.

Proxy Service
The proxy services contain the services which act as connection between members of the
service oriented system and conflict subsystem. The device and process services lie under this
type of services. Sometimes services which are defined under proxy services are called as
gateway services.

Device Service
The device service is a kind of proxy service which is referred as hardware device and used to
communicate between other services. The device service does not include the API which is not
well suited with the service oriented system.

Process Service
The device service is also a kind of proxy service which acts as interpreter between application
and service oriented system members. This service creates and arranges the application services
to implement the business processes.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 6
CS802 (B) Cloud Computing AIST SAGAR

SOAP

SOAP is an XML-based protocol for exchanging information between computers.


 SOAP is a communication protocol.
 SOAP is for communication between applications.
 SOAP is a format for sending messages.
 SOAP is designed to communicate via Internet.
 SOAP is platform independent.
 SOAP is language independent.
 SOAP is simple and extensible.
 SOAP allows you to get around firewalls.
 SOAP will be developed as a W3C standard.
SOAP is an open-standard, XML-based messaging protocol for exchanging information among
computers. This is a brief tutorial that introduces the readers to the fundamentals of SOAP
before moving on to explain its various elements, encoding, and how SOAP is transported.

SOAP is an acronym for Simple Object Access Protocol. It is an XML-based


messaging protocol for exchanging information among computers. SOAP is an
application of the XML specification.

Points to Note
 SOAP is a communication protocol designed to communicate via Internet.
 SOAP can extend HTTP for XML messaging.
 SOAP provides data transport for Web services.
 SOAP can exchange complete documents or call a remote procedure.
 SOAP can be used for broadcasting a message.
 SOAP is platform- and language-independent.
 SOAP is the XML way of defining what information is sent and how.
 SOAP enables client applications to easily connect to remote services and invoke remote
methods.
Although SOAP can be used in a variety of messaging systems and can be delivered via a
variety of transport protocols, the initial focus of SOAP is remote procedure calls transported
via HTTP.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 7
CS802 (B) Cloud Computing AIST SAGAR

Other frameworks including CORBA, DCOM, and Java RMI provide similar functionality to
SOAP, but SOAP messages are written entirely in XML and are therefore uniquely platform-
and language-independent.
UDDI AND WSDL :
The UDDI data model defines a generic structure for storing information about a business and
the web services it publishes. The UDDI data model is completely extensible, including several
repeating sequence structures of information.
However, WSDL is used to describe the interface of a web service. WSDL is fairly
straightforward to use with UDDI.
 WSDL is represented in UDDI using a combination of business Service,
bindingTemplate, and tModel information.
 As with any service registered in UDDI, generic information about the service is stored
in the business Service data structure, and information specific to how and where the
service is accessed is stored in one or more associated binding Template structures.
Each binding Template structure includes an element that contains the network address
of the service and has associated with it one or more tModel structures that describe and
uniquely identify the service.
 When UDDI is used to store WSDL information, or pointers to WSDL files,
the tModel should be referred to by convention as type wsdlSpec, meaning that
the overview Doc element is clearly identified as pointing to a WSDL service interface
definition.
 For UDDI, WSDL contents are split into two major elements the interface file and the
implementation file.
The Hertz reservation system web service provides a concrete example of how UDDI and
WSDL works together. Here is the <tModel> for this web service −
<tModelauthorizedName="..."operator="..."tModelKey="...">
<name>HertzReserveService</name>
<descriptionxml:lang="en">
WSDL description of the Hertz reservation service interface
</description>

<overviewDoc>
<descriptionxml:lang="en">
WSDL source document.
</description>
<overviewURL>
http://mach3.ebphost.net/wsdl/hertz_reserve.wsdl
</overviewURL>
</overviewDoc>

<categoryBag>

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 8
CS802 (B) Cloud Computing AIST SAGAR

<keyedReferencetModelKey="uuid:C1ACF26D-9672-4404-9D70-39B756E62AB4"
keyName="uddi-org:types"keyValue="wsdlSpec"/>
</categoryBag>
</tModel>
The key points are −
 The overview URL element gives the URL to where the service interface definition
WSDL file can be found. This allows humans and UDDI/WSDL aware tools to locate
the service interface definition.
 The purpose of the keyed Reference element in the category Bag is to make sure that this
Model is categorized as a WSDL specification document.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 9
CS802 (B) Cloud Computing AIST SAGAR

LECTURE 3 [UNIT-I]

RESTful Web Services:-

RESTful Web Services are basically REST Architecture based Web Services. In REST
Architecture everything is a resource. RESTful web services are light weight, highly scalable and
maintainable and are very commonly used to create APIs for web-based applications. This
tutorial will teach you the basics of RESTful Web Services and contains chapters discussing all
the basic components of RESTful Web Services with suitable examples.

What is REST architecture?


REST stands for Representational State Transfer. REST is web standards based architecture and
uses HTTP Protocol. It revolves around resource where every component is a resource and a
resource is accessed by a common interface using HTTP standard methods. REST was first
introduced by Roy Fielding in 2000.
In REST architecture, a REST Server simply provides access to resources and REST client
accesses and modifies the resources. Here each resource is identified by URIs/ global IDs.
REST uses various representation to represent a resource like text, JSON, XML. JSON is the
most popular one.

HTTP methods

Following four HTTP methods are commonly used in REST based architecture.
 GET − Provides a read only access to a resource.
 POST − Used to create a new resource.
 DELETE − Used to remove a resource.
 PUT − Used to update a existing resource or create a new resource.

Introduction to RESTFul web services


A web service is a collection of open protocols and standards used for exchanging data between
applications or systems. Software applications written in various programming languages and
running on various platforms can use web services to exchange data over computer networks
like the Internet in a manner similar to inter-process communication on a single computer. This
interoperability (e.g., between Java and Python, or Windows and Linux applications) is due to
the use of open standards.
Web services based on REST Architecture are known as RESTful web services. These
webservices uses HTTP methods to implement the concept of REST architecture. A RESTful
web service usually defines a URI, Uniform Resource Identifier a service, provides resource
representation such as JSON and set of HTTP Methods.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 10
CS802 (B) Cloud Computing AIST SAGAR

Creating RESTFul Webservice


In next chapters, we'll create a webservice say user management with following functionalities

Sr.No. URI HTTP Method POST body Result

1 /UserService/users GET empty Show list of all the users.

2 /UserService/addUser POST JSON String Add details of new user.

3 /UserService/getUser/:id GET empty Show details of a user.

Cloud Computing provides us means of accessing the applications as utilities over the Internet.
It allows us to create, configure, and customize the applications online.

SOFTWARE AS A SERVICE:

SaaS is also known as "On-Demand Software." It is a software distribution model in which services
are hosted by a cloud service provider. These services are available to end-users over the internet, so
the end-users do not need to install any software on their devices to access these services.

Fig 3: SAAS

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 11
CS802 (B) Cloud Computing AIST SAGAR

Characteristics of SaaS:
o Web-based Delivery: SaaS apps can be accessed from anywhere with an internet connection
because they are supplied over the internet, often through a web browser. Users no longer need to
install and maintain software programs on their local machines as a result.
o Multiple Users or "tenants" can access SaaS applications from a single instance of the program
thanks to the concept of multi-tenancy. As a result, the provider can serve several clients with the
same application without administering unique program instances for every client.
o Automatic Updates: SaaS providers are in charge of keeping the software up to date and making
sure that everyone has access to the newest features and security patches. Users are no longer
required to manually install updates or fixes as a result.
o Scalable: SaaS systems are scalable, which can readily grow or shrink in response to user
demand. This frees up enterprises from worrying about infrastructure or licensing fees and lets
them add or remove users as needed.
o Pricing on a Subscription Basis: SaaS programs are frequently sold using a subscription-based
pricing model, in which customers pay a monthly or yearly price to access the program. As a
result, companies won't need to invest significantly in software licenses upfront.
o Data Security, including data encryption, access restrictions, and backups, is the responsibility of
SaaS providers. Users no longer need to handle their own data security because of this.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 12
CS802 (B) Cloud Computing AIST SAGAR

LECTURE 4 [UNIT-I]

PLATFORM AS A SERVICE

Platform as a Service (PaaS) provides a runtime environment. It allows programmers to easily


create, test, run, and deploy web applications. You can purchase these applications from a cloud
service provider on a pay-as-per-use basis and access them using an Internet connection. In PaaS,
back-end scalability is managed by the cloud service provider, so end-users do not need to worry
about managing the infrastructure.

Fig 4: PaaS

PaaS includes infrastructure (servers, storage, and networking) and platform (middleware,
development tools, database management systems, business intelligence, and more) to support
the web application life cycle.

Examples: Google App Engine, Force.com, Joyent, Azure.

Some of the Services Provided by PaaS are:


Programming Languages: A variety of programming languages are supported by PaaS
providers, allowing developers to choose their favorite language to create apps. Languages
including Java, Python, Ruby,.NET, PHP, and Node.js are frequently supported.

Application Frameworks: Pre-configured application frameworks are offered by PaaS


platforms, which streamline the development process. These frameworks include features like
libraries, APIs, and tools for quick development, laying the groundwork for creating scalable and
reliable applications. Popular application frameworks include Laravel, Django, Ruby on Rails,
and Spring Framework.

Databases: Managed database services are provided by PaaS providers, making it simple for
developers to store and retrieve data. These services support relational databases (like MySQL,
PostgreSQL, and Microsoft SQL Server) and NoSQL databases (like MongoDB, Cassandra, and

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 13
CS802 (B) Cloud Computing AIST SAGAR

Redis). For its database services, PaaS platforms often offer automated backups, scalability, and
monitoring tools.

Additional Tools and Services: PaaS providers provide a range of extra tools and services to
aid in the lifecycle of application development and deployment. These may consist of the
following:

o Development Tools: to speed up the development process, these include integrated


development environments (IDEs), version control systems, build and deployment tools,
and debugging tools.
o Collaboration and Communication: PaaS platforms frequently come with capabilities
for team collaboration, including chat services, shared repositories, and project
management software.
o Analytics and Monitoring: PaaS providers may give tools for tracking application
performance, examining user behavior data, and producing insights to improve
application behavior and address problems.
o Security and Identity Management: PaaS systems come with built-in security features
like access control, encryption, and mechanisms for authentication and authorization to
protect the privacy of applications and data.
o Scalability and load balancing: PaaS services frequently offer automatic scaling
capabilities that let applications allocate more resources as needed to manage a spike in
traffic or demand. To improve performance and availability, load balancing features
divide incoming requests among various instances of the application.
Because of the services offered by PaaS platforms, developers may concentrate on creating
applications rather than worrying about the infrastructure, middleware, or database management
that supports them. A streamlined and effective environment is provided by PaaS for developing,
deploying, and managing applications.

ORGANIZATIONAL SCENARIO OF CLOUD

What is Cloud?

The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is
something, which is present at remote location. Cloud can provide services over public and
private networks, i.e., WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship management (CRM)
execute on cloud.

What is Cloud Computing?


Cloud Computing refers to manipulating, configuring, and accessing the hardware and
software resources remotely. It offers online data storage, infrastructure, and application.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 14
CS802 (B) Cloud Computing AIST SAGAR

Fig 5: Cloud Computing

Cloud computing offers platform independency, as the software is not required to be installed
locally on the PC. Hence, the Cloud Computing is making our business
applications mobile and collaborative.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 15
CS802 (B) Cloud Computing AIST SAGAR

LECTURE 5 [UNIT-I]

Basic Concepts

There are certain services and models working behind the scene making the cloud computing
feasible and accessible to end users. Following are the working models for cloud computing:

 Deployment Models
 Service Models

Deployment Models
Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud
can have any of the four types of access: Public, Private, Hybrid, and Community.

Fig 5: Cloud Deployment Models

Public Cloud

The public cloud allows systems and services to be easily accessible to the general public.
Public cloud may be less secure because of its openness.

Private Cloud

The private cloud allows systems and services to be accessible within an organization. It is
more secured because of its private nature.

Community Cloud

The community cloud allows systems and services to be accessible by a group of


organizations.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 16
CS802 (B) Cloud Computing AIST SAGAR

Hybrid Cloud

The hybrid cloud is a mixture of public and private cloud, in which the critical activities are
performed using private cloud while the non-critical activities are performed using public cloud.

Service Models
Cloud computing is based on service models. These are categorized into three basic service
models which are -

 Infrastructure-as–a-Service (IaaS)
 Platform-as-a-Service (PaaS)
 Software-as-a-Service (SaaS)
Anything-as-a-Service (XaaS) is yet another service model, which includes Network-as-a-
Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-
Service.
The Infrastructure-as-a-Service (IaaS) is the most basic level of service. Each of the service
models inherit the security and management mechanism from the underlying model, as shown
in the following diagram:

Fig 6: Client structure

Infrastructure-as-a-Service (IaaS)

IaaS provides access to fundamental resources such as physical machines, virtual machines,
virtual storage, etc.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 17
CS802 (B) Cloud Computing AIST SAGAR

Platform-as-a-Service (PaaS)

PaaS provides the runtime environment for applications, development and deployment tools,
etc.

Software-as-a-Service (SaaS)
SaaS model allows to use software applications as a service to end-users.

Benefits

Cloud Computing has numerous advantages. Some of them are listed below -
 One can access applications as utilities, over the Internet.
 One can manipulate and configure the applications online at any time.
 It does not require to install a software to access or manipulate cloud application.
 Cloud Computing offers online development and deployment tools, programming
runtime environment through PaaS model.
 Cloud resources are available over the network in a manner that provide platform
independent access to any type of clients.
 Cloud Computing offers on-demand self-service. The resources can be used without
interaction with cloud service provider.
 Cloud Computing is highly cost effective because it operates at high efficiency with
optimum utilization. It just requires an Internet connection
 Cloud Computing offers load balancing that makes it more reliable.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 18
CS802 (B) Cloud Computing AIST SAGAR

Fig 7: Cloud benefits

Characteristics of Cloud Computing


There are four key characteristics of cloud computing. They are shown in the following
diagram:

Fig 8: Cloud services

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 19
CS802 (B) Cloud Computing AIST SAGAR

On Demand Self Service

Cloud Computing allows the users to use web services and resources on demand. One can logon
to a website at any time and use them.

Broad Network Access


Since cloud computing is completely web based, it can be accessed from anywhere and at any
time.

Resource Pooling
Cloud computing allows multiple tenants to share a pool of resources. One can share single
physical instance of hardware, database and basic infrastructure.

Rapid Elasticity

It is very easy to scale the resources vertically or horizontally at any time. Scaling of resources
means the ability of resources to deal with increasing or decreasing demand.
The resources being used by customers at any given point of time are automatically monitored.

Measured Service

In this service cloud provider controls and monitors all the aspects of cloud service. Resource
optimization, billing, and capacity planning etc. depend on it.
In this Lecture we will discuss a few important questions around Cloud Monitoring.

 What is Cloud Monitoring?


 What Cloud Monitoring Includes?
 What are the different offerings in cloud monitoring?
 What are the benefits of cloud monitoring?
 What are the key features of cloud monitoring?
 What are Metadata key solution highlights that help to monitor, manage and control
resources of a cloud environment?

But before we delve deeper into each section, you must keep in mind that the big
responsibility lies on cloud managers who need to leverage the right tools if they want to
successfully monitor mission critical applications in the cloud environment.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 20
CS802 (B) Cloud Computing AIST SAGAR

LECTURE 6 [UNIT-I]

Cloud Monitoring
Cloud monitoring can be defined as the process of closely observing cloud-based
applications and services. It’s the process of controlling and reviewing the operational
workflow and processes within the cloud infrastructure.

This process involves use of manual as well as automated IT monitoring (with ITOM / NMS
tools) and certain cloud infrastructure management techniques to make sure it performs
optimally & efficiently.

Generally, admins have the authority to review the health and operational status of cloud
servers and components.

Concerns emerge based on the kind of cloud structure the organization has, and how they
utilize it. In case they are utilizing an open cloud infra, they will in general have limited
control for managing the IT infra. A private cloud, which most organizations use, offers
more control and adaptability, with included utilization benefits.

No matter what kind of cloud structure a company uses, monitoring is an important part of
performance and security.

What Cloud Monitoring Includes?

There are several elements that have to work in sync to optimize performance. Cloud
monitoring primarily includes the following:

 VM Monitoring: Monitoring the virtual machines (instances) created on the cloud.


 Web Pages Monitoring: Monitoring the traffic, processes, resource utilization and
availability of cloud-hosted websites.
 Database Monitoring: Monitoring different components of cloud database resources
such as processes, queries, availability and consumption.
 Storage Monitoring: Monitoring storage resources on the cloud and tracking
resource utilization.
 Virtual Network Monitoring: Tracking virtual network resources, connections,
devices and performance.
 Application Monitoring: Proactively monitoring the availability & performance of
critical applications deployed on the cloud whether it is on AWS or Microsoft Azure.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 21
CS802 (B) Cloud Computing AIST SAGAR

What are the different offerings in cloud monitoring?

There are different types of cloud services that needs monitoring. It is not only about
monitoring servers hosted on Google App Engine, Azure or AWS. For enterprise customers
it is all about monitoring what they consume (IT Infrastructure – Application, Database, OS,
Server, Network etc.) and use in their daily operations bifurcated into what they manage and
what the vendor manages.

What are the benefits of Cloud Monitoring?

Cloud monitoring tools are essential as they provide monitoring, management, reports and
can even alert you to possible service disruptions. Cloud monitoring he lps in minimizing
downtime and optimizing performance. Following are some of the ways to proactively
manage the cloud and avoid frequent issues:

Data Security: For security it is important to attain strict control over data at all endpoints,
thus minimizing risks. Quick fixes that analyze, scan and take action on data as it leaves the
network help protect against data loss. It’s also crucial to scan, evaluate and analyze
incoming data to avoid malware and data breaches before it’s downloaded to the network.

APIs: The cloud can have multitude of performance issues due to poorly constructed APIs.
Poor cloud API performance can be avoided by using APIs that work via objects instead of
operations. Eventually there’ll be fewer individual API calls and less traffic. APIs with few
data type restrictions and logical design results in improved performance.

Application Workflow: Supporting resources and an application’s response time are


important to understand what’s deteriorating the performance.

To pinpoint where and when delay occurs you need to follow an application’s workflow.

Tools that track consumption, performance and availability are required for monitoring the
cloud while guaranteeing the secure transfer of data.

Just to summarize and highlights on the main benefits:

 No IT infrastructure required
 No CAPEX – only pay monthly subscription
 Quick Setup and Installation as infrastructure is already in place

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 22
CS802 (B) Cloud Computing AIST SAGAR

 Scale as you need – can cater to organizations of different sizes


 Zero Downtime
 Quick Installation
 Unified Dashboard
 Open API for seamless integration
 Improved business efficiency
 Complete Visibility into Cloud Resources
 Monitor services and apps from any location having internet access

As per Gartner, I&O leaders should implement the following to cope up with the increased
demand especially during the rapid digitalization that’s kicking in:

 Expanding workload capacity on-premise with the help of public cloud services
 With the help of cloud native architecture IT leaders can auto scale & build up
capacity for surged demand
 Real time performance monitoring to ensure the continuity of business operations
 On-premise data centers may not be able to handle the surge in demand, moving to
cloud is a smart move
 Leveraging multi-cloud tools to prevent resource shortfalls in specific areas.

What are the features of Cloud Monitoring?

Cloud monitoring makes it simple to analyses patterns and detect potential security risks in
the cloud infrastructure.
Following are some of the key capabilities:

 Investigating and reporting capabilities for security compliance


 Uninterrupted monitoring to ensure recent and modified files are examined in real
time
 Accommodating an array of cloud service providers
 Large volumes of cloud data across various distributed locations can be monitored
 Potential attacks or compromises can be identified by enabling visibility into user,
application and file behavior.

Monitoring Private, Public, and Hybrid Clouds

 Cloud monitoring is straightforward if you engage in a private cloud for a few


reasons we mentioned earlier (visibility and control), as you have connection to the
software stack and systems.
 Nevertheless, monitoring can be further problematic in public or hybrid clouds.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 23
CS802 (B) Cloud Computing AIST SAGAR

 A hybrid cloud setting presents uncommon challenges because data consists in both
the public and private cloud. Constraints regarding compliance and security can
create problems for data accessing users.
 Admins can clarify performance issues by identifying in which cloud the data has to
be stored in addition to what data to update.
 Synchronization of data can be a roadblock as well, but segregating data into faster
and smaller parts helps in diminishing issues.

Even though private cloud grants more control, to ensure optimum performance one still
need to monitor workloads.

If you don’t have a clear view of workload and network performance, then you won’t be
able to justify architectural or configuration changes, for a better quality of service
implementations or other technologies.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 24
CS802 (B) Cloud Computing AIST SAGAR

LECTURE 7 [UNIT-I]

Hypervisor

A hypervisor, also known as a virtual machine monitor or VMM. The hypervisor is a piece of
software that allows us to build and run virtual machines which are abbreviated as VMs.

A hypervisor allows a single host computer to support multiple virtual machines (VMs) by
sharing resources including memory and processing.

What is the use of a hypervisor?

Hypervisors allow the use of more of a system's available resources and provide greater IT
versatility because the guest VMs are independent of the host hardware which is one of the major
benefits of the Hypervisor.

In other words, this implies that they can be quickly switched between servers. Since a
hypervisor with the help of its special feature, it allows several virtual machines to operate on a
single physical server. So, it helps us to reduce:

o The Space efficiency


o The Energy uses
o The Maintenance requirements of the server.

Fig 9 : Role of Hypervisor

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 25
CS802 (B) Cloud Computing AIST SAGAR

Kinds of Hypervisors

There are two types of hypervisors: "Type 1" (also known as "bare metal") and "Type 2" (also
known as "hosted"). A type 1 hypervisor functions as a light operating system that operates
directly on the host's hardware, while a type 2 hypervisor functions as a software layer on top of
an operating system, similar to other computer programs.

Since they are isolated from the attack-prone operating system, bare-metal hypervisors are
extremely stable.

Furthermore, they are usually faster and more powerful than hosted hypervisors. For these
purposes, the majority of enterprise businesses opt for bare-metal hypervisors for their data
center computing requirements.

While hosted hypervisors run inside the OS, they can be topped with additional (and different)
operating systems.

The hosted hypervisors have longer latency than bare-metal hypervisors which is a very major
disadvantage of the it. This is due to the fact that contact between the hardware and the
hypervisor must go through the OS's extra layer.

The Type 1 hypervisor

The native or bare metal hypervisor, the Type 1 hypervisor is known by both names.

It replaces the host operating system, and the hypervisor schedules VM services directly to the
hardware.

The type 1 hypervisor is very much commonly used in the enterprise data center or other server-
based environments.

It includes KVM, Microsoft Hyper-V, and VMware vSphere. If we are running the updated
version of the hypervisor then we must have already got the KVM integrated into the Linux
kernel in 2007.

The Type 2 hypervisor

It is also known as a hosted hypervisor, The type 2 hypervisor is a software layer or framework
that runs on a traditional operating system.

It operates by separating the guest and host operating systems. The host operating system
schedules VM services, which are then executed on the hardware.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 26
CS802 (B) Cloud Computing AIST SAGAR

Individual users who wish to operate multiple operating systems on a personal computer should
use a form 2 hypervisor.

This type of hypervisor also includes the virtual machines with it.

Hardware acceleration technology improves the processing speed of both bare-metal and hosted
hypervisors, allowing them to build and handle virtual resources more quickly.

On a single physical computer, all types of hypervisors will operate multiple virtual servers for
multiple tenants. Different businesses rent data space on various virtual servers from public
cloud service providers. One server can host multiple virtual servers, each of which is running
different workloads for different businesses.

What is a cloud hypervisor?

Hypervisors are a key component of the technology that enables cloud computing since they are
a software layer that allows one host device to support several virtual machines at the same time.

Hypervisors allow IT to retain control over a cloud environment's infrastructure, processes, and
sensitive data while making cloud-based applications accessible to users in a virtual
environment.

Increased emphasis on creative applications is being driven by digital transformation and


increasing consumer expectations. As a result, many businesses are transferring their virtual
computers to the cloud.

Having to rewrite any existing application for the cloud, on the other hand, will eat up valuable
IT resources and create infrastructure silos.

A hypervisor also helps in the rapid migration of applications to the cloud as being a part of a
virtualization platform.

As a result, businesses will take advantage of the cloud's many advantages, such as lower
hardware costs, improved accessibility, and increased scalability, for a quicker return on
investment.

Benefits of hypervisors

Using a hypervisor to host several virtual machines has many advantages:

o Speed: The hypervisors allow virtual machines to be built instantly unlike bare-metal
servers. This makes provisioning resources for complex workloads much simpler.

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 27
CS802 (B) Cloud Computing AIST SAGAR

o Efficiency: Hypervisors that run multiple virtual machines on the resources of a single
physical machine often allow for more effective use of a single physical server.
o Flexibility: Since the hypervisor distinguishes the OS from the underlying hardware, the
program no longer relies on particular hardware devices or drivers, bare-metal
hypervisors enable operating systems and their related applications to operate on a variety
of hardware types.
o Portability: Multiple operating systems can run on the same physical server thanks to
hypervisors (host machine). The hypervisor's virtual machines are portable because they
are separate from the physical computer.

As an application requires more computing power, virtualization software allows it to access


additional machines without interruption.

VIDEO REFERENCES:

1) https://youtu.be/KDPEVT-PylU?list=PLL7liBDYa4YaKc07Ht4YWc1ZLSpiUFOnC
2) https://youtu.be/_wWygQt2z1M?list=PLL7liBDYa4YaKc07Ht4YWc1ZLSpiUFOn
C
3) https://youtu.be/fMVYlGDj7cA?list=PLL7liBDYa4YaKc07Ht4YWc1ZLSpiUFOnC
4) https://youtu.be/5G0L7XCt6XQ
5) https://youtu.be/CaHBhnc1e_I

QUICK QUESTIONS:

1. What is Cloud Computing?


2. What do you mean by web services?
3. What is SAAS?
4. What is PaaS?
5. What is the role of Hypervisor?
6. Explain cloud monitoring?
7. Name different services provided by cloud?
8. What are the benefits of cloud computing?
9. What do you mean by SOAP?
10. Give somne examples of cloud that we use daily?

Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 28

You might also like