Specialized Cloud Architectures

Slides:



Advertisements
Similar presentations
Virtualisation From the Bottom Up From storage to application.
Advertisements

Fundamental Cloud Architectures
What’s New: Windows Server 2012 R2 Tim Vander Kooi Systems Architect
Database Administration and Security Transparencies 1.
ITC561 Cloud Computing Topic 4: Cloud Architecture …. Continue….
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 2: Managing Hardware Devices.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
STORAGE Virtualization
Operating Systems.
© 2006 EMC Corporation. All rights reserved. Managing the Data Center Section 5.2.
Virtualization Infrastructure Administration Cluster Jakub Yaghob.
Implementing Failover Clustering with Hyper-V
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Elad Hayun Agenda What's New in Hyper-V 2012 Storage Improvements Networking Improvements VM Mobility Improvements.
Presented by : Ran Koretzki. Basic Introduction What are VM’s ? What is migration ? What is Live migration ?
Windows Server 2008 R2 CSIT 320 (Blum) 1. Server Consolidation – Today’s chips have enhanced capabilities compared to those of the past. In particular.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 2: Managing Hardware Devices.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Appendix B Planning a Virtualization Strategy for Exchange Server 2010.
Module – 4 Intelligent storage system
Hadoop Hardware Infrastructure considerations ©2013 OpalSoft Big Data.
Web Cache Redirection using a Layer-4 switch: Architecture, issues, tradeoffs, and trends Shirish Sathaye Vice-President of Engineering.
Server Virtualization
Using NAS as a Gateway to SAN Dave Rosenberg Hewlett-Packard Company th Street SW Loveland, CO 80537
Server VirtualizationServer Virtualization Hyper-V 2012.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 12: Planning and Implementing Server Availability and Scalability.
VMware vSphere Configuration and Management v6
Full and Para Virtualization
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Course 03 Basic Concepts assist. eng. Jánó Rajmond, PhD
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
1 High-availability and disaster recovery  Dependability concepts:  fault-tolerance, high-availability  High-availability classification  Types of.
Planning File and Print Services Lesson 5. File Services Role The File Services role and the other storage- related features included with Windows Server.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
PHD Virtual Technologies “Reader’s Choice” Preferred product.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 12: Planning and Implementing Server Availability and Scalability.
Chapter 6: Securing the Cloud
VPN Extension Requirements for Private Clouds
Business Continuity & Disaster Recovery
Use Case for Distributed Data Center in SUPA
Workload Distribution Architecture
Fujitsu Training Documentation Online Storage Migration
Fujitsu Training Documentation RAID Groups and Volumes
Operating System Structure
Chapter 4: Routing Concepts
SAN and NAS.
Introduction to Networks
Introduction to Networks
AWS COURSE DEMO BY PROFESSIONAL-GURU. Amazon History Ladder & Offering.
Storage Virtualization
Introduction of Week 6 Assignment Discussion
Module – 7 network-attached storage (NAS)
Business Continuity & Disaster Recovery
Direct Attached Storage and Introduction to SCSI
An Introduction to Computer Networking
Parallel and Multiprocessor Architectures – Shared Memory
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Specialized Cloud Mechanisms
Chapter 1 Introduction to Operating System Part 5
Cloud computing mechanisms
Cloud Computing Architecture
Cloud Computing Architecture
Presentation transcript:

Specialized Cloud Architectures

Specialized Cloud Architectures Direct I/O Access Architecture Direct LUN Access Architecture Dynamic Data Normalization Architecture Elastic Network Capacity Architecture Cross-Storage Device Vertical Tiering Architecture Intra-Storage Device Vertical Data Tiering Architecture Load Balanced Virtual Switches Architecture Multipath Resource Access Architecture Persistent Virtual Network Configuration Architecture Redundant Physical Connection for Virtual Servers Architecture Storage Maintenance Window Architecture

Direct I/O Access Architecture In virtualization environment, access to I/O cards are usually provided via a hypervisor-based layer. Sometimes direct access to these I/O cards deem necessary. This architecture enables VM to circumvent (bypass) the hypervisor and directly access to physical I/O cards. Host CPU must support this type of access with the appropriate drivers installed. Benefit: Increased workload can be handled (I/O access emulation increases latency).

Other mechanisms: Cloud usage monitor Logical network perimeter Pay-per-use monitor Resource replication (replace virtual I/O with physical I/O

Direct LUN Access Architecture Storage LUN are mapped via a host bus adapter (HBA) on the hypervisor. As a result, the storage LUN is emulated as file-based storage to virtual servers. Sometimes virtual servers need to directly access block-based storage (storage LUNs). For example, access via emulated adapter is insufficient when a cluster is implemented and a LUN is used a shared cluster storage device between two virtual servers. Benefit: Enable a cluster of virtual servers to access to a shared LUN directly (as a shared volumn).

Other mechanisms: Cloud usage monitor Pay-per-use monitor Resource replication (block-based storage instead of file-based storage)

Dynamic Data Normalization Architecture Issues of having redundant data in cloud-based environment: Increased time required to store and catalog files Increased required storage and backup space Increased costs due to increased data volume Increased time required for replication to secondary storage Increased time required to backup data Data normalization architecture establishes a de-duplication system.

De-Duplication System Hash codes (every piece of data) are generated and maintained. Data is received, examined and hashed. Newly generated hash is compared. If duplicated block, a pointer is generated and saved. If not, new blocks are saved.

Elastic Network Capacity Architecture Although IT resources may be scaled on-demand, performance and scalability may be inhibited (held back) by limited network bandwidth. This architecture dynamically allocates additional bandwidth when cloud consumer demand increases (to avoid network bottlenecks). Additional bandwidth and/or network ports are allocated when required.

Other Mechanisms Automated scaling listener Intelligent automation engine – run scripts to modify number of allocated ports Cloud usage monitor Logical network perimeter Pay-per-use monitor Resource replication – add additional network ports

Cross-Storage Device Vertical Tiering Architecture Cloud storage sometimes cannot handle increasing performance requirements (IOPS), and needs to scale-up. Vertical scaling – inefficient and time-consuming, resources may be wasteful when not needed.

Cross-Storage Device Vertical Tiering Architecture (2) This architecture establishes a system that survives bandwidth and data processing power scaling by vertically scaling between storage devices that have different capacity. LUNs can automatically scale up and down across multiple devices (e.g., between traditional hard drives and SSDs). Automated scaling listener monitors the requests and signals the storage management program to move LUN to a higher capacity (both bandwidth and processing power) when the requests increase.

Other mechanisms: Audit monitor Pay-per-use Cloud usage

Intra-Storage Device Vertical Data Tiering Architecture In certain scenarios, cloud consumers may have distinct data storage requirements (security, privacy, legal requirements) restricting the data physical’s location to a single cloud storage device. This limitation may pose severe scalability limitations (cascade to any cloud services or apps that are dependent upon the use of the cloud storage. This architecture establishes a system to support vertical scaling within a single cloud storage device. Intra-device scaling system optimizes the availability of different disk types with different capacities.

Load Balanced Virtual Switches Architecture Virtual servers are connected to the outside world via virtual switches, which send and receive traffic with the same uplink. Bandwidth bottlenecks form when the network traffic on the uplink’s port increases to a point that it causes transmission delays, performance issues, packet loss, and lag time. The load balanced virtual switches architecture establishes a load balancing system where multiple uplinks are provided to balance network traffic workloads across multiple uplinks or redundant paths, which can help avoid slow transfers and data loss.

Other mechanisms: Cloud usage monitor Load balancer Logical network perimeter Resource replication – additional uplinks Hypervisor Virtual server

Multipath Resource Access Architecture Certain IT resources can only be accessed using an assigned path (or hyperlink) that leads to their exact location. Path can be lost or incorrectly defined – IT resource unavailability. This architecture establishes a multipathing system with alternative paths to IT resources, so that cloud consumers have the means to programmatically or manually overcome path failures.

Other mechanisms involved in this architecture: Cloud storage device Hypervisor Virtual server Logical network perimeter Resource replication

Persistent Virtual Network Configuration Architecture Network configurations and port assignments for virtual servers are generated during the creation of the virtual switch on the host physical server and the hypervisor hosting the virtual server. These configurations and assignments reside in the virtual server’s immediate hosting environment, meaning a virtual server that is moved or migrated to another host will lose network connectivity because destination hosting environments do not have the required port assignments and network configuration information.

Persistent Virtual Network Configuration Architecture (2) In this architecture, network configuration information is stored in a centralized location and replicated to physical server hosts. This allows the destination host to access the configuration information when a virtual server is moved from one host to another. The system established with this architecture includes a centralized virtual switch, VIM, and configuration replication technology. The centralized virtual switch is shared by physical servers and configured via the VIM, which initiates replication of the configuration settings to the physical servers.

Redundant Physical Connection for Virtual Servers Architecture

Storage Maintenance Window Architecture Cloud storage devices that are subject to maintenance and administrative tasks sometimes need to be temporarily shut down, meaning cloud service consumers and IT resources consequently lose access to these devices and their stored data. The storage maintenance window architecture enables cloud service consumers to be automatically and transparently redirected to the secondary cloud storage device, without becoming aware that their primary storage device has been taken offline.