Lecture 2 Enabling Technologies
Lecture 2 Enabling Technologies
Background
• Modern-day clouds are underpinned by a set of primary technology
components that collectively enable key features and characteristics
associated with contemporary cloud computing.
• We will cover following such technologies in this lecture.
Technologies
Broadband Networks and Internet Architecture.
Data Center Technology
Virtualization Technology
Web Technology
Multitenant Technology
Containerization
Broadband Networks and Internet Architecture.
• Connectivity Issues
• In traditional, on-premise deployment models, enterprise applications and
various IT solutions are commonly hosted on centralized servers and
storage devices residing in the organization’s own data center.
• End-user devices, such as smartphones and laptops, access the data center
through the corporate network, which provides uninterrupted Internet
connectivity.
• TCP/IP facilitates both Internet access and on-premise data exchange over
LANs.
• End-user devices that are connected to the network through the Internet
can be granted continuous access to centralized servers and applications in
the cloud
Technical and Business Considerations
• Connectivity Issues
• Organizations using this deployment model can directly access the network
traffic to and from the Internet and usually have complete control over and
can safeguard their corporate networks using firewalls and monitoring
software.
• These organizations also assume the responsibility of deploying, operating,
and maintaining their IT resources and Internet connectivity.
• End-user devices that are connected to the network through the Internet can
be granted continuous access to centralized servers and applications in the
cloud.
• Cloud providers can easily configure cloud-based IT resources to be
accessible for both external and internal users through an Internet connection.
• Major cloud providers offer Internet connectivity that is superior to the
connectivity of individual organizations, resulting in additional network usage
charges as part of their pricing model.
Technical and Business Considerations
• Network Bandwidth and Latency Issues
• In addition to being affected by the bandwidth of the data link that connects
networks to ISPs, end-to-end bandwidth is determined by the transmission
capacity of the shared data links that connect intermediary nodes.
• ISPs need to use broadband network technology to implement the core network
required to guarantee end-to-end connectivity.
• This type of bandwidth is constantly increasing, as Web acceleration
technologies, such as dynamic caching, compression, and pre-fetching,
continue to improve end-user connectivity.
• Also referred to as time delay, latency is the amount of time it takes a packet to
travel from one data node to another.
• Latency increases with every intermediary node on the data packet’s path.
Transmission queues in the network infrastructure can result in heavy load
conditions that also increase network latency.
• Networks are dependent on traffic conditions in shared nodes, making Internet
latency highly variable and often unpredictable.
• IT solutions need to be assessed against business requirements that are affected
by network bandwidth and latency, which are inherent to cloud
interconnection.
Technical and Business Considerations
• Cloud Carrier and Cloud Provider Selection
• The service levels of Internet connections between cloud consumers
and cloud providers are determined by their ISPs, which are usually
different and therefore include multiple ISP networks in their paths.
• QoS management across multiple ISPs is difficult to achieve in
practice, requiring collaboration of the cloud carriers on both sides
to ensure that their end-to-end service levels are sufficient for
business requirements.
• Cloud consumers and cloud providers may need to use multiple
cloud carriers in order to achieve the necessary level of connectivity
and reliability for their cloud applications, resulting in additional
costs.
• Cloud adoption can therefore be easier for applications with more
relaxed latency and bandwidth requirements.
Data Center Technology
• Grouping IT resources in close proximity with one another, rather than having
them geographically dispersed, allows for power sharing, higher efficiency in
shared IT resource usage, and improved accessibility for IT personnel.
• IT resources, such as servers, databases, networking and telecommunication
devices, and software systems.
• Data centers are typically comprised of the following technologies and
components:
1. Virtualization
2. Standardization and Modularity
3. Automation
4. Remote Operation and Management
5. High Availability
6. Computing Hardware
7. Storage Hardware
8. Network Hardware
Virtualization
• Data centers consist of both physical and virtualized IT resources.
• The physical IT resource layer refers to the facility infrastructure that
houses computing/networking systems and equipment, together with
hardware systems and their operating systems.
• The resource abstraction and control of the virtualization layer is
comprised of operational and management tools that are often based on
virtualization platforms that abstract the physical computing and
networking IT resources as virtualized components that are easier to
allocate, operate, release, monitor, and control.
Virtualization
Standardization and Modularity
• Data center facilities are custom-designed locations that are outfitted with
specialized computing, storage, and network equipment.
• These facilities have several functional layout areas, as well as various power
supplies, cabling, and environmental control stations that regulate heating,
ventilation, air conditioning, fire protection, and other related subsystems.
Storage Hardware
• Data center facilities are custom-designed locations that are outfitted with
specialized computing, storage, and network equipment.
• These facilities have several functional layout areas, as well as various power
supplies, cabling, and environmental control stations that regulate heating,
ventilation, air conditioning, fire protection, and other related subsystems.
Virtualization
• Virtualization is the process of converting a physical IT resource into a virtual IT resource.
• Types:
• Servers – A physical server can be abstracted into a virtual server.
• Storage – A physical storage device can be abstracted into a virtual storage device or a virtual disk.
• Network – Physical routers and switches can be abstracted into logical network fabrics, such as VLANs.
• Power – A physical UPS and power distribution units can be abstracted into what are commonly
• referred to as virtual UPSs.
Process of Virtualization
• The first step in creating a new virtual server through virtualization software is the allocation of physical IT
resources, followed by the installation of an operating system.
• Then install guest the operating system
Virtual servers use their own guest operating systems, which are independent of the operating system in
which they were created.
The physical server is not as the host or physical host
The virtualization software is called Virtual Machine monitor or Virtual Machine manager or Hipervisor.
Hardware Independence
• The installation of an operating system’s configuration and application software in a unique IT hardware
platform results in many software-hardware dependencies.
• However here virtualization is the conversion process that translates unique IT hardware into emulated and
standardized software-based copies.
• Through hardware independence, virtual servers can easily be moved to another virtualization host,
automatically resolving multiple hardware-software incompatibility issues.
• This makes cloning, replication and other manipulation operation to be much easier.
Server Consolidation
• The process that allows multiple virtual servers to be simultaneously
created in the same virtualization host.
• Virtualization technology enables different virtual servers to share
one physical server.
• The resulting flexibility is such that different virtual servers can run
different guest operating systems on the same host.
Resource Replication
• Virtual servers are created as virtual disk images that contain binary
file copies of hard disk content.
• These virtual disk images are accessible to the host’s operating
system, meaning simple file operations, such as copy, move, and
paste, can be used to replicate, migrate, and back up the virtual
server.
Purpose of Replication
• It enables:
• The creation of standardized virtual machine images commonly configured to include virtual hardware
capabilities, guest operating systems, and additional application software, for pre-packaging in virtual disk
images in support of instantaneous deployment.
• Increased agility in the migration and deployment of a virtual machine’s new instances by being able to
rapidly scale out and up.
• The ability to roll back, which is the instantaneous creation of VM snapshots by saving the state of the virtual
server’s memory and hard disk image to a host-based file. (Operators can easily revert to these snapshots and
restore the virtual machine to its prior state.)
• The support of business continuity with efficient backup and restoration procedures, as well as the creation of
multiple instances of critical IT resources and applications.
Self study
• Operating System-Based Virtualization.
• Hardware-Based Virtualization.
• Virtualization Management
• Performance Overhead
• Special Hardware Compatibility
• Portability
• Web Technology
• Containerization
• Multinenant