0% found this document useful (0 votes)
38 views

Unit 2

The document discusses the cloud lifecycle model and its phases. It can be summarized as follows: 1. The cloud lifecycle model (CDLC) is a linear process with phases including requirement analysis, architecture, implementation, quality assurance, deployment, monitoring and audit. 2. The key phases involve analyzing requirements, designing architecture, implementing and integrating solutions, testing quality, deploying, monitoring performance over time, and conducting audits. 3. Cloud management follows a lifecycle of planning, setup, building, testing, deployment, monitoring, metering, charging and optimization of resources.

Uploaded by

20-CS-04 B.SC CS
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Unit 2

The document discusses the cloud lifecycle model and its phases. It can be summarized as follows: 1. The cloud lifecycle model (CDLC) is a linear process with phases including requirement analysis, architecture, implementation, quality assurance, deployment, monitoring and audit. 2. The key phases involve analyzing requirements, designing architecture, implementing and integrating solutions, testing quality, deploying, monitoring performance over time, and conducting audits. 3. Cloud management follows a lifecycle of planning, setup, building, testing, deployment, monitoring, metering, charging and optimization of resources.

Uploaded by

20-CS-04 B.SC CS
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 80

Unit-2

Cloud lifecycle model:


• The lifecycle management of cloud is so
efficient that the IT sector can easily achieve
the traditional virtualized environment
• The Cloud Life Cycle (CDLC) is the repeated life
cycle model for growth, deployment and delivery
of cloud.
• Cloud is organized in a linear manner and every
phase is processed individually.
• Therefore, it is the most simplest and flexible
process model.
• The outcome of the one phase of CDLC becomes
input to another phase.
• In this model, a cloud environment development
begins with requirement and analysis phase.
• After effectively demonstrating and understanding
the requirement, the architect phase starts.
• The quality assurance and verification phase
continues after completion of implementation
and integration, monitor and migrate.
• Audit begins after completion of the deployment,
testing, maintenance and improvement.
• Cloud lifecycle management provides:

• ● Ease in administrating cloud and service portal


• ● Manageable service
• ● Established multi-tenancy
• ● Include performance and capacity management
• ● Support heterogeneity primary goals of a cloud
environment such as agility, cost savings and
optimal use of resources.
Phases of CDLC:

• 1.Requirement and Analysis:

• Requirement and analysis method is used to


evaluate and understand the requirements of an
end user.
• This is done by taking up the significant complaints
from the user, network solution, management and
customers of the present system.
• 2.Architect:
• The structural behaviour of the cloud architecture gives
solution to the cloud system which comprises of on-
premise resource, cloud resources, cloud services, cloud
middleware, software components, data server location
and externally visible properties of data server location.
• Figure 5.2 shows that the components of cloud
architecture are reference architecture, technical
architecture and deployment and operational
architecture.
• 3.Implementation and Integration:

• Third phase of CDLC is the actual formation and enablement of the


private, public, community, hybrid, inter and hosted cloud solutions
to a computing problem.
•  
• Implementation: Events such as privacy, protection, regular, legality,
mentality, inter-machine message and privacy theory are addressed
within the implementation phase.
•  
• Integration: Integration is intermediate between the source and
target systems for extracting data, mediating and publishing it.
• Five possibilities and recommendations for
integrating into cloud effectively are as
follows:
• 1. Plan and set realistic goals
• 2. Learn from other’s experience
• 3. Require IT specialist team
• 4. Address security concerns
• 5. Maximize connectivity options
• 4. Quality Assurance and Verification:

• In this phase, cloud auditing is done to ensure


the quality of the cloud network.
• It also confirms the performance, reliability,
availability, elasticity and safety of cloud
network at the service level.
• 5.Deploy, Testing and Improvement:

• Different platform service providers drastically


reduce the deployment cost of the application
by pre-building and pre-configuring a stack of
application infrastructure in this phase.
• 6.Monitor, Migrate and Audit:

• This phase is marked by periodically


monitoring the cloud environment and
measuring the performance of the system.
Cloud Management Lifecycle:
 
• The enterprise manager (Figure 5.3) manages the lifecycle such as
planning, setting up, building, testing and deploying, monitoring,
managing, metering, charging and optimizating.
 
• Planning: Enterprise manager helps in creating a cloud set-up with
brand new hardware, new software and even a new data centre.

• Set-up: Enterprise manager adopts the IaaS, PaaS and DBaaS model
clouds and the various services offered by these models.
 
• Building: Packing and publishing of applications are done with the
help of the available cloud computing services.
• Testing and deploying: After building an application, it has to be
tested. The testing portfolio available in enterprise manager does
this job. The resultant changes due to the testing are stored in the
database. Testing also estimates the load capacity after
deployment.
•  
• Monitoring and managing: It monitors the settings, standards,
policies and organizes for better management.
•  
• Metering, charging and optimization: Usage of resources such as
CPU, storage (GB) and memory are to be metered and charged
accordingly.
1.1.2 Role Of Cloud Modelling And Architecture:

 
• 1. Cloud Computing Model:
•  
• Cloud computing model supports convenient, on-
demand software using the Internet. The computing
devices used are released after usage without any
manual intervention. The model
• for cloud computing supports the availability comprising
of five required characteristics, four
• deployments and three service structures.
• 2 Necessary Characteristics:

• On-demand self-service: Any customers can unilaterally use


computing capabilities such as network storage and server
time as desired without human interaction with every service
provider.
•  
• Broad network access: Services are networked and can be
accessed over standard mechanisms which promote use in
mixed thick or thin user platforms (e.g., handheld devices such
as mobile phones, laptops and PDAs).
•  
• Resource pooling: Resources of providers are grouped to serve
multiple users by means of a multi-tenant structure along with
different virtual and physical resources assigned dynamically.
• Rapid elasticity: Services can be run elastically and rapidly to
speed up scale out and fast release. As for the customer, the
services available for running often, appear to be unlimited
that can be bought in any amount at any point of time.

• Measured service: In cloud system, controlling and


optimization of resources happen automatically and it is done
by controlling and metering at some stage of abstraction
appropriate to the kind of service, for example, the
bandwidth, processing, storage and accounts of active users.
• 3. Service Models:
• Cloud software as a service: These are capabilities provided to the
customer to deploy applications in the infrastructure provided by the
service provider. Deployed applications can be accessed by any device
supported by WWW. In this case, controlling or managing the
network, server, operating systems, storage, memory or even single
application with the possible payment of user-specifi c application
setting and configuration are not done by the customer.
•  
• Cloud platform as a service: The service includes installation on the
cloud system infrastructure created by the user itself or is an acquired
application that may be written in some programming language using
tools that are supported and/or provided by the service provider. The
end user does not control or manage the infrastructure of cloud
computing system that comprises servers, networks storages or
operating systems.
•  
• Cloud infrastructure as a service: In this, same capabilities and
resources are provided but the consumer can deploy and run the
• 4 Deployment Models:
•  
• ● Private cloud: These are functions within the
organization and behind the firewall.
• ● Community cloud: This cloud infrastructure is common
to several organizations.
• ● Public cloud: This cloud infrastructure is available to
public or large industries.
• ● Hybrid cloud: It is a composite of two and more
clouds.
Cloud Architecture:
• Cloud computing architecture is a combination
of service-oriented architecture and event-
driven architecture. Cloud computing
architecture is divided into the following two
parts -
• Front End
• Back End
• Front End
• The front end is used by the client. It contains client-side
interfaces and applications that are required to access the
cloud computing platforms.g: Chrome, Firefox, internet
explorer, etc.
• Back End
• The back end is used by the service provider. It manages all
the resources that are required to provide cloud computing
services. It includes a huge amount of data storage,
security mechanism, virtual machines, deploying models,
servers, traffic control mechanisms, etc.
Components of Cloud Computing Architecture

• There are the following components of cloud computing


architecture -
• 1. Client Infrastructure
• Client Infrastructure is a Front end component. It provides GUI
(Graphical User Interface)  to interact with the cloud.
• 2. Application
• The application may be any software or platform that a client
wants to access.
• 3. Service
• A Cloud Services manages that which type of service you
access according to the client’s requirement.
• Cloud computing offers the following three type of services:
– Software as a Service (SaaS) 
– Platform as a Service (PaaS)
– Infrastructure as a Service (IaaS)
• 4. Runtime Cloud
• Runtime Cloud provides the execution and runtime
environment to the virtual machines.
• 5. Storage
• Storage is one of the most important components of cloud
computing. It provides a huge amount of storage capacity in the
cloud to store and manage data.
• 6. Infrastructure
• It provides services on the host level, application level,
and network level. Cloud infrastructure includes hardware and
software components such as servers, storage, network devices,
virtualization software, and other storage resources that are
needed to support the cloud computing model.
• 7. Management
• Management is used to manage components such as
application, service, runtime cloud, storage, infrastructure, and
other security issues in the backend and establish coordination
between them.
• 8. Security
• Security is an in-built back end component of cloud computing.
It implements a security mechanism in the back end.
• 9. Internet
• The Internet is medium through which front end and back end
can interact and communicate with each other.
• Factors to be considered while designing cloud-based
architectures are highlighted as follows:
• ● Cost: Clearly understand the pricing details for various
cloud models.
• ● Complexity: Analyse the complexity before customizing the
cloud solution and check the
• requirements thoroughly before deployment.
• ● Speed: Check the speed for cloud model. Speed in terms of
advanced CPU architecture,
• high memory, lowest latency and network infrastructure.
• ● Cloud portability: Check the portability. This allows the
consumer to move from one vendor
• to another without making much changes in the architecture.
• ● Security: Check for the security measurements provided by
the vendor.
Cloud Deployment Models:

• What Is A Cloud Deployment Model?


• It works as your virtual computing
environment with a choice of deployment
model depending on how much data you want
to store and who has access to the
Infrastructure.
Different Types Of Cloud Computing Deployment Models

• Thus, deployment models for cloud computing


are categorized based on their location.
• To know which model would best fit the
requirements of your organization, let us first
learn about the various types.
Public Cloud
• Public deployment models in the cloud are perfect for
organizations with growing and fluctuating demands.
• It also makes a great choice for companies with low-
security concerns.
• Thus, you pay a cloud service provider for networking
services, compute virtualization & storage available on the
public internet.
• It is also a great delivery model for the teams with
development and testing. Its configuration and deployment
are quick and easy, making it an ideal choice for test
environments.
• Benefits of Public Cloud
• Minimal Investment - As a pay-per-use service,
there is no large upfront cost and is ideal for
businesses who need quick access to resources
• No Hardware Setup - The cloud service providers
fully fund the entire Infrastructure
• No Infrastructure Management - This does not
require an in-house team to utilize the public
cloud.
• Limitations of Public Cloud
• Data Security and Privacy Concerns - Since it is
accessible to all, it does not fully protect against cyber-
attacks and could lead to vulnerabilities.
• Reliability Issues - Since the same server network is
open to a wide range of users, it can lead to
malfunction and outages
• Service/License Limitation - While there are many
resources you can exchange with tenants, there is a
usage cap.
Private Cloud
• Companies that look for cost efficiency and
greater control over data & resources will find
the private cloud a more suitable choice.
• The private cloud offers bigger opportunities
that help meet specific organizations'
requirements when it comes to customization.
• It's also a wise choice for mission-critical
processes that may have frequently changing
requirements.
• Benefits of Private Cloud
• Data Privacy - It is ideal for storing corporate data
where only authorized personnel gets access
• Security - Segmentation of resources within the
same Infrastructure can help with better access
and higher levels of security.
• Supports Legacy Systems - This model supports
legacy systems that cannot access the public
cloud.
• Limitations of Private Cloud
• Higher Cost - With the benefits you get, the
investment will also be larger than the public
cloud. Here, you will pay for software, hardware,
and resources for staff and training.
• Fixed Scalability - The hardware you choose will
accordingly help you scale in a certain direction
• High Maintenance - Since it is managed in-house,
the maintenance costs also increase.
Community Cloud
• The community cloud operates in a way that is similar
to the public cloud.
• There's just one difference - it allows access to only a
specific set of users who share common objectives
and use cases.
• This type of deployment model of cloud computing is
managed and hosted internally or by a third-party
vendor.
• However, you can also choose a combination of all
three.
• Benefits of Community Cloud
• Smaller Investment - A community cloud is
much cheaper than the private & public cloud
and provides great performance
• Setup Benefits - The protocols and
configuration of a community cloud must align
with industry standards, allowing customers to
work much more efficiently.
• Limitations of Community Cloud
• Shared Resources - Due to restricted
bandwidth and storage capacity, community
resources often pose challenges.
• Not as Popular - Since this is a recently
introduced model, it is not that popular or
available across industries
Hybrid Cloud
• Hybrid cloud is a combination of two or more cloud
architectures. While each model in the hybrid cloud
functions differently, it is all part of the same architecture.
• A company with critical data will prefer storing on a
private cloud, while less sensitive data can be stored on a
public cloud.
• The hybrid cloud is also frequently used for 'cloud
bursting'. It means, supposes an organization runs an
application on-premises, but due to heavy load, it can
burst into the public cloud.
• Benefits of Hybrid Cloud
• Cost-Effectiveness - The overall cost of a hybrid
solution decreases since it majorly uses the public
cloud to store data.
• Security - Since data is properly segmented, the
chances of data theft from attackers are significantly
reduced.
• Flexibility - With higher levels of flexibility, businesses
can create custom solutions that fit their exact
requirements
• Limitations of Hybrid Cloud
• Complexity - It is complex setting up a hybrid
cloud since it needs to integrate two or more
cloud architectures
• Specific Use Case - This model makes more
sense for organizations that have multiple use
cases or need to separate critical and sensitive
data
MODEL FOR FEDERATED CLOUD COMPUTING

• Cloud Federation:

• Cloud federation is interconnecting the cloud computing


environments with two or more service providers for
balancing the traffic load and to surge spikes while there is
demand.
• Cloud federation offers two benefits to the cloud providers.
1. First, it generates revenues from the idle computer
resources to providers.
2. Second, it enables providers to move across borders.
What is Cloud Federation?

• Federation means different cloud flavours are interconnected


and so are their internal resources.
• IT organizations can select their flavours based on their needs
such as computing and workload.
• Federation acts as a bridge between two cloud environments.
• Enterprise users analyze them in terms of application and not
in terms of federation.
• The key issues in federation are bridging the differences,
setting consistent rules, streamlining cloud management and
bringing vision to life.
Two-layer Connectivity for Cloud Federation:

 
• Hybrid clouds are achieving almost worldwide
publicity because of the way enterprises utilize the
cloud.
• As the hybrid model interconnects internal and
external resources, consumers can choose the
most appropriate requirements for their workload.
• This kind of approach enables dynamic
deployment of applications,
• for example:
 
• ● Using multiple clouds and multiple applications
based on business needs
• ● Allocating components to an application in
different environments
• ● Moving an application based on their
requirements and lifecycle stages
• ● Moving workloads closer to consumers
CLOUD ECOSYSTEM MODEL

• Cloud Ecosystem:
•  
• Cloud ecosystem is a term, which defines the complexity
of the systems in terms of its interdependent components
that work together to enable cloud services. The complex
inhabitants of organisms and its running as an ecological
unit is said to be the ecosystem. In cloud computing,
convoluted period encompasses not only customary
components, for example programs and infrastructure, but
furthermore advisors, integrators, partners and vendors.
Virtualization:
• Virtualization is the "creation of a virtual
(rather than actual) version of something,
such as a server, a desktop, a storage device,
an operating system or network resources".
What is the concept behind the Virtualization?

• Creation of a virtual machine over existing


operating system and hardware is known as
Hardware Virtualization.
• A Virtual machine provides an environment that is
logically separated from the underlying hardware.
• The machine on which the virtual machine is
going to create is known as Host Machine and
that virtual machine is referred as a Guest
Machine.
Following are some reasons for using virtualization:
 
• ● To run legacy applications, VM is used.
• ● VM provides a secured and sandbox for running an untrusted
application.
• ● VM helps in building secured computing platform.
• ● VM provides an illusion of hardware.
• ● VM simulates networks of independent computers.
• ● VM supports to run distinct OS with different versions.
• ● VMs are uses for performance monitoring. Operating systems can be
checked without disturbing the productivity.
• ● VM provides fault and error containment.
• ● VM tools are good for research and academic experiments.
• ● ● VM enables to share memory in multiprocessor architecture.
• ● VM makes the job easier for the administrative staff in migration,
backup and recovery.
Types of Virtualization:
• Hardware Virtualization.
• Operating system Virtualization.
• Server Virtualization.
• Storage Virtualization.
1) Hardware Virtualization:
• When the virtual machine software or virtual
machine manager (VMM) is directly installed on the
hardware system is known as hardware virtualization.
• The main job of hypervisor is to control and
monitoring the processor, memory and other
hardware resources.
• Usage:
• Hardware virtualization is mainly done for the server
platforms, because controlling virtual machines is
much easier than controlling a physical server.
• Advantages of Hardware Virtualization
• The main benefits of hardware virtualization are more
efficient resource utilization, lower overall costs as well as
increased uptime and IT flexibility.
• 1) More Efficient Resource Utilization:
• Physical resources can be shared among virtual machines.
Although the unused resources can be allocated to a virtual
machine and that can be used by other virtual machines if
the need exists.
• 2) Lower Overall Costs Because Of Server Consolidation:
• Now it is possible for multiple operating systems can co-
exist on a single hardware platform, so that the number of
servers, rack space, and power consumption drops
significantly.
• 3) Increased Uptime Because Of Advanced Hardware
Virtualization Features:
• The modern hypervisors provide highly orchestrated
operations that maximize the abstraction of the
hardware and help to ensure the maximum uptime.
These functions help to migrate a running virtual
machine from one host to another dynamically, as well
as maintain a running copy of virtual machine on another
physical host in case the primary host fails.
• 4) Increased IT Flexibility:
• Hardware virtualization helps for quick deployment of
server resources in a managed and consistent ways. That
results in IT being able to adapt quickly and provide the
business with resources needed in good time.
2.Software Virtualization:

• Managing applications and distribution becomes a typical


task for IT departments. Installation mechanism differs
from application to application. Some programs require
certain helper applications or frameworks and these
applications may have conflict with existing applications.
• Software virtualization is just like a virtualization but able
to abstract the software installation procedure and create
virtual software installations.
• Virtualized software is an application that will be
"installed" into its own self-contained unit.
• Advantages of Software Virtualization
• 1) Client Deployments Become Easier:
• Copying a file to a workstation or linking a file in a network
then we can easily install virtual software.
• 2) Easy to manage:
• To manage updates becomes a simpler task. You need to
update at one place and deploy the updated virtual
application to the all clients.
• 3) Software Migration:
• Without software virtualization, moving from one
software platform to another platform takes much time for
deploying and impact on end user systems. With the help
of virtualized software environment the migration
becomes easier.
3) Server Virtualization:

• When the virtual machine software or virtual machine


manager (VMM) is directly installed on the Server
system is known as server virtualization.
• Server Virtualization is the process of dividing a
physical server into several virtual servers,
called virtual private servers. Each virtual private
server can run independently.
• The concept of Server Virtualization widely used in
the IT infrastructure to minimizes the costs by
increasing the utilization of existing resources.
Types of Server Virtualization
• 1. Hypervisor
• In the Server Virtualization, Hypervisor plays an important role. It is
a layer between the operating system (OS) and hardware.
• There are two types of hypervisors.
• Type 1 hypervisor ( also known as bare metal or native
hypervisors)
• Type 2 hypervisor ( also known as hosted or Embedded
hypervisors)
• The hypervisor is mainly used to perform various tasks such as
allocate physical hardware resources (CPU, RAM, etc.) to several
smaller independent virtual machines, called "guest" on the host
machine.
2. Full Virtualization

• Full Virtualization uses a hypervisor to directly


communicate with the CPU and physical server. It
provides the best isolation and security mechanism
to the virtual machines.
• The biggest disadvantage of using hypervisor in full
virtualization is that a hypervisor has its own
processing needs, so it can slow down the
application and server performance.
• VMWare ESX server is the best example of full
virtualization.
3. Para Virtualization
• Para Virtualization is quite similar to the Full
Virtualization. The advantage of using this
virtualization is that it is easier to use, Enhanced
performance, and does not require emulation
overhead. Xen primarily and UML use the Para
Virtualization.
• The difference between full and pare virtualization is
that, in para virtualization hypervisor does not need
too much processing power to manage the OS.
4.Operating System Virtualization
• When the virtual machine software or virtual
machine manager (VMM) is installed on the
Host operating system instead of directly on the
hardware system is known as operating system
virtualization.
• Usage:
• Operating System Virtualization is mainly used
for testing the applications on different
platforms of OS.
• Operating system virtualization is also called as system-
lever virtualization.
• It is a server virtualization technology that divides one
operating system into multiple isolated user-space
called virtual environments.
• The biggest advantage of using server visualization is
that it reduces the use of physical space, so it will save
money.
• Linux OS Virtualization and Windows OS
Virtualization are the types of Operating System
virtualization.
• FreeVPS, OpenVZ, and Linux Vserver are some
examples of System-Level Virtualization.
5. Hardware Assisted Virtualization

• Hardware Assisted Virtualization was


presented by AMD and Intel. It is also known
as Hardware virtualization, AMD
virtualization, and Intel virtualization.
• It is designed to increase the performance of
the processor. The advantage of using
Hardware Assisted Virtualization is that it
requires less hypervisor overhead.
6. Kernel-Level Virtualization:
• Kernel-level virtualization is one of the most
important types of server virtualization. It is
an open-source virtualization which uses the Linux
 kernel as a hypervisor.
• The advantage of using kernel virtualization is that it
does not require any special administrative
software and has very less overhead.
• User Mode Linux (UML) and Kernel-based virtual
machine are some examples of kernel virtualization.
Advantages of Server Virtualization:
• There are the following advantages of Server
Virtualization -
• 1. Independent Restart
• In Server Virtualization, each server can be restart
independently and does not affect the working of
other virtual servers.
• 2. Low Cost
• Server Virtualization can divide a single server into
multiple virtual private servers, so it reduces the cost
of hardware components.
• 3. Disaster Recovery<
• Disaster Recovery is one of the best advantages of Server
Virtualization. In Server Virtualization, data can easily and
quickly move from one server to another and these data can
be stored and retrieved from anywhere.
• 4. Faster deployment of resources
• Server virtualization allows us to deploy our resources in a
simpler and faster way.
• 5. Security
• It allows uses to store their sensitive data inside the data
centers.
Disadvantages of Server Virtualization:

• The biggest disadvantage of server virtualization is that


when the server goes offline, all the websites that are
hosted by the server will also go down.
• There is no way to measure the performance of
virtualized environments.
• It requires a huge amount of RAM consumption.
• It is difficult to set up and maintain.
• Some core applications and databases are not supported
virtualization.
• It requires extra hardware resources.
Uses of Server Virtualization:
• Server Virtualization is used in the testing and
development environment.
• It improves the availability of servers.
• It allows organizations to make efficient use of
resources.
• It reduces redundancy without purchasing
additional hardware components.
4) Storage Virtualization:
• Storage virtualization is the process of grouping the
physical storage from multiple network storage devices
so that it looks like a single storage device.
• Storage virtualization is also implemented by using
software applications.
• Usage:
• Storage virtualization is mainly done for back-up and
recovery purposes.
• Storage virtualization is becoming more and more
important in various other forms:
Advantages of Storage Virtualization
• Data is stored in the more convenient locations
away from the specific host. In the case of a host
failure, the data is not compromised necessarily.
• The storage devices can perform advanced
functions like replication, reduplication, and
disaster recovery functionality.
• By doing abstraction of the storage level, IT
operations become more flexible in how storage
is provided, partitioned, and protected.
Network Virtualization:

• The procedure of blending the accessible assets in a mesh by dividing


up the accessible bandwidth into channels is called network
virtualization.
• Network management is a time-consuming process for a network
administrator.
• Network virtualization can improve productivity and effi ciency by
performing tasks automatically. Sharing or reallocation of storage
space can be done among the servers. Adding or reassigning the
storage media such as hard drives and tape drives can be done easily.
• Network speed, reliability, flexibility, scalability and security can be
optimized using network virtualization.

You might also like