SlideShare a Scribd company logo
 Virtualization plays an important role as an enabling technology for
datacenter implementation by abstracting compute, network, and storage
service platforms from the underlying physical hardware.
 Because secure, efficient, and scalable management of these virtualized
infrastructures is essential to guarantee optimal datacenter operation, the
virtual infrastructure manager is a key component of the datacenter
architecture.
 A cloud OS defines the VM as the basic execution unit and the virtualized
services (group of VMs for executing a multitier service) as the basic
management entity.
 This concept helps create scalable applications because the user can either
add VMs as needed (horizontal scaling) or resize a VM (if supported by
the underlying hypervisor technology) to satisfy a VM workload increase
(vertical scaling).
The deployment of services in a cloud involves not only the provision of
VMs but also the instantiation of communication networks to interconnect the
different service components and to make the service reachable for external
users, if needed.
The network manager should be able to manage private networks to
interconnect both the service’s internal components and public IP address
pools and connect the front-end service components to the Internet.
 The storage manager’s main function is to provide storage services and
final-user virtual storage systems as a commodity.
 The storage system must be scalable so that it can grow dynamically
according to service needs; highly available and reliable, to avoid data
access disruption in data access in case of failure; high-performance, to
support strong demands of data-intensive workloads; and easy to manage,
abstracting users from the underlying physical storage’s complexity.
 Image managers must handle a huge amount of VM images belonging to
different users, with different operating systems and software
configurations.
 A set of attributes defines the VM image, including the image’s name, a
description of its contents, the type of image—public, private, or shared—
the image owner, and the image’s location within the repository.
 The information manager is responsible for monitoring and gathering
information about the state of VMs, physical servers, and other
components of virtual and physical infrastructures such as network devices
and storage systems. This monitoring function is essential to ensure that all
these components are performing optimally.
 Monitoring at the VM level relies on the information provided by
hypervisors, which can be very limited and might differ from one
hypervisor to another.
 User authentication verifies and confirms the identity of users who try to
access cloud resources. This function can be implemented using different
methods, such as simple password verification mechanisms via LDAP;
trusted authentication mechanisms based on public keys, X.509 certificates
or Kerberos.
 Authorization policies control and manage user privileges and permissions
to access different cloud resources, such as VMs, networks, or storage
systems. Access control can be implemented using role-based mechanisms,
where a role defines a group of permissions to perform certain operations
over specific cloud resources and users can be assigned particular roles.
 The federation manager enables access to remote cloud infrastructures,
which can be either partner infrastructures governed by a similar cloud OS
entity or public cloud providers.
 The federation manager should provide basic mechanisms for deployment,
runtime management, and termination of virtual resources in remote
clouds; remote resource monitoring; user authentication in remote cloud
instances; access control management and remote resource permission; and
tools for image building on different clouds with different image formats.
 The service manager’s admission control function entails deciding whether
to accept or reject a service, depending on the service requirements and
resource availability in the cloud.
 To deploy a new service, the service manager interacts with the scheduler
to decide the best placement for the various VMs that comprise the service,
according to the selected optimization criteria and service constraints.
 Cloud federation, which enables cloud providers and IT companies to
collaborate and share their resources, is associated with many portability
and interoperability issues.
 Cloud developers and researchers have proposed or implemented
numerous federation architectures, including cloud bursting, brokering,
aggregation, and multitier.
 These architectures can be classified according to the level of coupling or
interoperation among the cloud instances involved, ranging from loosely
coupled (with no or little interoperability among cloud instances) to tightly
coupled (with full interoperability among cloud instances).

More Related Content

What's hot

Design Patterns for Micro Service Architecture
Design Patterns for Micro Service ArchitectureDesign Patterns for Micro Service Architecture
Design Patterns for Micro Service Architecture
Sarah Elson
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformspurplesea
 
Web Design Service Upstate New York : A-reed
Web Design Service Upstate New York : A-reed Web Design Service Upstate New York : A-reed
Web Design Service Upstate New York : A-reed
Reed Associates
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Project Wihidum
Project WihidumProject Wihidum
Project Wihidum
Prabath Abeysekara
 
Basics of cms
Basics of cmsBasics of cms
Basics of cms
Buycmstemplate
 
Electronic commerce meets the semantic web
Electronic commerce meets the semantic webElectronic commerce meets the semantic web
Electronic commerce meets the semantic web
MaheshBabu435
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDAugusto Ciuffoletti
 
Modularity by Microservices
Modularity by MicroservicesModularity by Microservices
Modularity by Microservices
Andrei Rugina
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
Shakas Technologies
 
Implementing Domain Events with Kafka
Implementing Domain Events with KafkaImplementing Domain Events with Kafka
Implementing Domain Events with Kafka
Andrei Rugina
 
Presentation transaction
Presentation transactionPresentation transaction
Presentation transaction
Afzaal Sahil
 
A trust management system for ad hoc mobile
A trust management system for ad hoc mobileA trust management system for ad hoc mobile
A trust management system for ad hoc mobileAhmed Hammam
 
Axis2, middleware for next generation web services
Axis2, middleware for next generation web servicesAxis2, middleware for next generation web services
Axis2, middleware for next generation web services
Srinath Perera
 
Review of access control models for cloud computing
Review of access control models for cloud computingReview of access control models for cloud computing
Review of access control models for cloud computing
csandit
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesMatteo Leonetti
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
Mohammed Sajjad Ali
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Tal Lavian Ph.D.
 

What's hot (19)

Design Patterns for Micro Service Architecture
Design Patterns for Micro Service ArchitectureDesign Patterns for Micro Service Architecture
Design Patterns for Micro Service Architecture
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Web Design Service Upstate New York : A-reed
Web Design Service Upstate New York : A-reed Web Design Service Upstate New York : A-reed
Web Design Service Upstate New York : A-reed
 
Yongsan presentation 2
Yongsan presentation 2Yongsan presentation 2
Yongsan presentation 2
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Project Wihidum
Project WihidumProject Wihidum
Project Wihidum
 
Basics of cms
Basics of cmsBasics of cms
Basics of cms
 
Electronic commerce meets the semantic web
Electronic commerce meets the semantic webElectronic commerce meets the semantic web
Electronic commerce meets the semantic web
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRID
 
Modularity by Microservices
Modularity by MicroservicesModularity by Microservices
Modularity by Microservices
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Implementing Domain Events with Kafka
Implementing Domain Events with KafkaImplementing Domain Events with Kafka
Implementing Domain Events with Kafka
 
Presentation transaction
Presentation transactionPresentation transaction
Presentation transaction
 
A trust management system for ad hoc mobile
A trust management system for ad hoc mobileA trust management system for ad hoc mobile
A trust management system for ad hoc mobile
 
Axis2, middleware for next generation web services
Axis2, middleware for next generation web servicesAxis2, middleware for next generation web services
Axis2, middleware for next generation web services
 
Review of access control models for cloud computing
Review of access control models for cloud computingReview of access control models for cloud computing
Review of access control models for cloud computing
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing Services
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
 

Similar to Iaas cloudarchitectures

Iaa s cloud architectures
Iaa s cloud architecturesIaa s cloud architectures
Iaa s cloud architecturespurplesea
 
IaaS Cloud Architectures from Virtualized Data Centers to Federated Cloud Inf...
IaaS Cloud Architectures from Virtualized Data Centers to Federated Cloud Inf...IaaS Cloud Architectures from Virtualized Data Centers to Federated Cloud Inf...
IaaS Cloud Architectures from Virtualized Data Centers to Federated Cloud Inf...
Zeehasham Rasheed
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
Prabhat gangwar
 
Cloud Services: Types of Cloud
Cloud Services: Types of CloudCloud Services: Types of Cloud
Cloud Services: Types of Cloud
Dr. Sunil Kr. Pandey
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment model
Hitesh Mohapatra
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...
IJECEIAES
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
Cloud Computing MODULE-2 to understand the cloud computing concepts.ppt
Cloud Computing  MODULE-2 to understand the cloud computing concepts.pptCloud Computing  MODULE-2 to understand the cloud computing concepts.ppt
Cloud Computing MODULE-2 to understand the cloud computing concepts.ppt
mithunrocky72
 
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT  WITH IBM SYSTEMS AND SOFTWAREPRIVATE CLOUDS FLOAT  WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
IBM India Smarter Computing
 
T04503113118
T04503113118T04503113118
T04503113118
IJERA Editor
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
IEEEGLOBALSOFTTECHNOLOGIES
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
Mannat Singh
 
Cloud Def V15
Cloud Def V15Cloud Def V15
Cloud Def V15
Krishna Kumar
 
Cloud def-v15
Cloud def-v15Cloud def-v15
Cloud def-v15
sengura
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx
shruti533256
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
hemanthbbc
 

Similar to Iaas cloudarchitectures (20)

Iaa s cloud architectures
Iaa s cloud architecturesIaa s cloud architectures
Iaa s cloud architectures
 
IaaS Cloud Architectures from Virtualized Data Centers to Federated Cloud Inf...
IaaS Cloud Architectures from Virtualized Data Centers to Federated Cloud Inf...IaaS Cloud Architectures from Virtualized Data Centers to Federated Cloud Inf...
IaaS Cloud Architectures from Virtualized Data Centers to Federated Cloud Inf...
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Cloud Services: Types of Cloud
Cloud Services: Types of CloudCloud Services: Types of Cloud
Cloud Services: Types of Cloud
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment model
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud Computing MODULE-2 to understand the cloud computing concepts.ppt
Cloud Computing  MODULE-2 to understand the cloud computing concepts.pptCloud Computing  MODULE-2 to understand the cloud computing concepts.ppt
Cloud Computing MODULE-2 to understand the cloud computing concepts.ppt
 
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT  WITH IBM SYSTEMS AND SOFTWAREPRIVATE CLOUDS FLOAT  WITH IBM SYSTEMS AND SOFTWARE
PRIVATE CLOUDS FLOAT WITH IBM SYSTEMS AND SOFTWARE
 
F1034047
F1034047F1034047
F1034047
 
T04503113118
T04503113118T04503113118
T04503113118
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Cloud Def V15
Cloud Def V15Cloud Def V15
Cloud Def V15
 
Cloud def-v15
Cloud def-v15Cloud def-v15
Cloud def-v15
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Iaas cloudarchitectures

  • 1.
  • 2.  Virtualization plays an important role as an enabling technology for datacenter implementation by abstracting compute, network, and storage service platforms from the underlying physical hardware.  Because secure, efficient, and scalable management of these virtualized infrastructures is essential to guarantee optimal datacenter operation, the virtual infrastructure manager is a key component of the datacenter architecture.
  • 3.  A cloud OS defines the VM as the basic execution unit and the virtualized services (group of VMs for executing a multitier service) as the basic management entity.  This concept helps create scalable applications because the user can either add VMs as needed (horizontal scaling) or resize a VM (if supported by the underlying hypervisor technology) to satisfy a VM workload increase (vertical scaling).
  • 4. The deployment of services in a cloud involves not only the provision of VMs but also the instantiation of communication networks to interconnect the different service components and to make the service reachable for external users, if needed. The network manager should be able to manage private networks to interconnect both the service’s internal components and public IP address pools and connect the front-end service components to the Internet.
  • 5.  The storage manager’s main function is to provide storage services and final-user virtual storage systems as a commodity.  The storage system must be scalable so that it can grow dynamically according to service needs; highly available and reliable, to avoid data access disruption in data access in case of failure; high-performance, to support strong demands of data-intensive workloads; and easy to manage, abstracting users from the underlying physical storage’s complexity.
  • 6.  Image managers must handle a huge amount of VM images belonging to different users, with different operating systems and software configurations.  A set of attributes defines the VM image, including the image’s name, a description of its contents, the type of image—public, private, or shared— the image owner, and the image’s location within the repository.
  • 7.  The information manager is responsible for monitoring and gathering information about the state of VMs, physical servers, and other components of virtual and physical infrastructures such as network devices and storage systems. This monitoring function is essential to ensure that all these components are performing optimally.  Monitoring at the VM level relies on the information provided by hypervisors, which can be very limited and might differ from one hypervisor to another.
  • 8.  User authentication verifies and confirms the identity of users who try to access cloud resources. This function can be implemented using different methods, such as simple password verification mechanisms via LDAP; trusted authentication mechanisms based on public keys, X.509 certificates or Kerberos.  Authorization policies control and manage user privileges and permissions to access different cloud resources, such as VMs, networks, or storage systems. Access control can be implemented using role-based mechanisms, where a role defines a group of permissions to perform certain operations over specific cloud resources and users can be assigned particular roles.
  • 9.  The federation manager enables access to remote cloud infrastructures, which can be either partner infrastructures governed by a similar cloud OS entity or public cloud providers.  The federation manager should provide basic mechanisms for deployment, runtime management, and termination of virtual resources in remote clouds; remote resource monitoring; user authentication in remote cloud instances; access control management and remote resource permission; and tools for image building on different clouds with different image formats.
  • 10.  The service manager’s admission control function entails deciding whether to accept or reject a service, depending on the service requirements and resource availability in the cloud.  To deploy a new service, the service manager interacts with the scheduler to decide the best placement for the various VMs that comprise the service, according to the selected optimization criteria and service constraints.
  • 11.  Cloud federation, which enables cloud providers and IT companies to collaborate and share their resources, is associated with many portability and interoperability issues.  Cloud developers and researchers have proposed or implemented numerous federation architectures, including cloud bursting, brokering, aggregation, and multitier.  These architectures can be classified according to the level of coupling or interoperation among the cloud instances involved, ranging from loosely coupled (with no or little interoperability among cloud instances) to tightly coupled (with full interoperability among cloud instances).

Editor's Notes

  1. In the same way that a multithreaded OS defines the thread as the unit of execution and the multithreaded application as the management entity supporting several communication and synchronization instruments.
  2. As different virtual networks can share a common physical link, the network manager should provide an automated procedure for MAC and IP address assignment to avoid address overlap problems. It should also offer additional mechanisms to guarantee traffic isolation between different virtual networks. Traffic isolation can be achieved either by filtering the Ethernet traffic in the device the VM is attached to or by configuring a VLAN (IEEE 802.1Q) each time a new virtual network is instantiated.
  3. The support for other advanced features such as creation of cross-site networks and virtual storage systems or cross-site VM migration will depend on the federation capabilities that remote clouds offer, as well as the level of coupling and interoperability supported by the different clouds involved. However, user-level federation scenarios could be implemented with a third-party stand-alone service, such as Aeolus (http://aeolusproject.org), which offers brokering services to access different cloud providers.