Chapter 04
Cloud Computing Systems
N. Xiong
Georgia State University
N. Xiong@ GSU
Slide 1
Chapter 04
Review and Introduction
N. Xiong@ GSU
Slide 2
Chapter 04
Chapter 05 Main Contents







N. Xiong@ GSU
Cloud Computing and Service Models
Datacenter Design and Interconnection
Networks
Architectural Design of Computing Clouds
Cloud Platforms and Service Models
Resource Management and Design
Challenges
Cloud Security and Trust Management
Homework Problems
Slide 3
Chapter 04
Public, Private, and Hybrid Clouds
N. Xiong@ GSU
Slide 4
Chapter 04
Over Open Internet
N. Xiong@ GSU
Slide 5
Chapter 04
Cloud Design Objectives

Shifting Computing from Desktops to
Datacenters

Service Provisioning and Cloud Economics

Scalability in Performance

Data Privacy Protection

High Quality of Cloud Services

New Standards and Interfaces
N. Xiong@ GSU
Slide 6
Chapter 04
Cloud Ecosystem and Cost Model
N. Xiong@ GSU
Slide 7
Chapter 04
Cloud Ecosystem for Building Private
Clouds
N. Xiong@ GSU
Slide 8
Chapter 04
Popular Cloud Service Models
N. Xiong@ GSU
Slide 9
Chapter 04
Customized Cloud Services
N. Xiong@ GSU
Slide 10
Chapter 04
Datacenter Growth and Cost
Breakdown
N. Xiong@ GSU
Slide 11
Chapter 04
Warehouse-Scale Datacenter Design
N. Xiong@ GSU
Slide 12
Chapter 04
Cooling System of a Datacenter
Room
N. Xiong@ GSU
Slide 13
Chapter 04
Datacenter Interconnection
Networks
Specific Design Considerations:


Application Traffic Support

Network Expandability

Fault Tolerance and Graceful Degradation

Switch-centric Datacenter Design
N. Xiong@ GSU
Slide 14
Chapter 04
Fat-tree Switch Network Design
N. Xiong@ GSU
Slide 15
Chapter 04
Modular Datacenters in Containers
N. Xiong@ GSU
Slide 16
Chapter 04
Interconnection among Modular
Datacenters
N. Xiong@ GSU
Slide 17
Chapter 04
Modularized Datacenter Cube
network
N. Xiong@ GSU
Slide 18
Chapter 04
Datacenter Management Issues
Making the Common Users Happy

Controlled Information Flows

Multi-User Manageability

Scalability in Database Growth

Reliability in Virtualized Infrastructure

Lowered Costs to both Users and Providers

Security Enforcement and Data Protection

Green Information Technology

N. Xiong@ GSU
Slide 19
Chapter 04
Google Datacenter Health Monitoring
Infrastructure
N. Xiong@ GSU
Slide 20
Chapter 04
Marketplaces in Cloud computing
Services
N. Xiong@ GSU
Slide 21
Chapter 04
Enabling Technologies for Clouds
N. Xiong@ GSU
Slide 22
Chapter 04
A Generic Cloud Architecture
N. Xiong@ GSU
Slide 23
Chapter 04
Layered Cloud Architectural
Development
N. Xiong@ GSU
Slide 24
Chapter 04
System Virtualization
N. Xiong@ GSU
Slide 25
Chapter 04
Virtualization Tools
N. Xiong@ GSU
Slide 26
Chapter 04
VM Cloning for Disaster Recovery
N. Xiong@ GSU
Slide 27
Chapter 04
Virtualization Support in Public
Clouds
N. Xiong@ GSU
Slide 28
Chapter 04
Data and Software Protection
Techniques
Data Integrity and Privacy Protection

Data Coloring and Cloud Watermarking

Data Lock-in Problem and Proactive Solutions

N. Xiong@ GSU
Slide 29
Chapter 04
The Concept of Data Coloring
N. Xiong@ GSU
Slide 30
Chapter 04
Cloud Watermarking for Trust
Management
N. Xiong@ GSU
Slide 31
Chapter 04
Five Levels of Cloud Players in
Industry
N. Xiong@ GSU
Slide 32
Chapter 04
Major Cloud Providers and Service
Offerings
N. Xiong@ GSU
Slide 33
Chapter 04
Six Layers of Cloud Services
N. Xiong@ GSU
Slide 34
Chapter 04
Three Classes of Cloud Players
N. Xiong@ GSU
Slide 35
Chapter 04
Software Stack for Cloud Computing
N. Xiong@ GSU
Slide 36
Chapter 04
Cloud Service Stack
N. Xiong@ GSU
Slide 37
Chapter 04
Application Cloud Services Tasks
N. Xiong@ GSU
Slide 38
Chapter 04
Resource Provisioning and Platform
Deployment
N. Xiong@ GSU
Slide 39
Chapter 04
Provisioning of Storage Resources
N. Xiong@ GSU
Slide 40
Chapter 04
Resource Provisioning Strategies
N. Xiong@ GSU
Slide 41
Chapter 04
Virtual Machine Creation and
Management
N. Xiong@ GSU
Slide 42
Chapter 04
Benchmark Experiments on an InterGrid
Testbed over The Grid’5000
N. Xiong@ GSU
Slide 43
Chapter 04
Cloud Loading Results
N. Xiong@ GSU
Slide 44
Chapter 04
Basic Cloud Security
Protection of servers from malicious software
attacks like worms, viruses, and malwares.

Protection of hypervisors or VM monitors from
software based attacks and vulnerabilities.

Protection of VMs and monitors from service
disruption and denial of service attacks.

Protection of data and information from theft,
corruption and natural disasters.

Providing authenticated and authorized access to
critical data and services

N. Xiong@ GSU
Slide 45
Chapter 04
Mapping of Cloud
Models to Various Security Measures
N. Xiong@ GSU
Slide 46
Chapter 04
Cloud Defense Methods
N. Xiong@ GSU
Slide 47
Chapter 04
Cloud Security Deployment by Vordel
Company
N. Xiong@ GSU
Slide 48
Chapter 04
Distributed Defense against DDoS
Flooding Attacks
N. Xiong@ GSU
Slide 49
Chapter 04
DDoS Attacks Over Multiple Network
Domains
N. Xiong@ GSU
Slide 50
Chapter 04
Man-in-The–Middle Attacks
N. Xiong@ GSU
Slide 51
Chapter 04
Reputation System Design Options
N. Xiong@ GSU
Slide 52
Chapter 04
Trust Overlay Networks
N. Xiong@ GSU
Slide 53
Chapter 04
Some References and Further
Reading
N. Xiong@ GSU
Slide 54
Chapter 04
Homework Problems
N. Xiong@ GSU
Slide 55
Chapter 04
Homework Problems
N. Xiong@ GSU
Slide 56
Descargar

Document