| |
| |
Foreword | |
| |
| |
Acknowledgments | |
| |
| |
| |
Introduction | |
| |
| |
| |
Objectives of This Book | |
| |
| |
| |
What This Book Does Not Cover | |
| |
| |
| |
Who This Book Is For | |
| |
| |
| |
How This Book Is Organized | |
| |
| |
| |
Conventions | |
| |
| |
Symbols and Figures | |
| |
| |
Summary of Key Points | |
| |
| |
| |
Additional Information | |
| |
| |
Updates, Errata, and Resources (www.servicetechbooks.com) | |
| |
| |
Referenced Specifications (www.servicetechspecs.com) | |
| |
| |
The Service Technology Magazine (www.servicetechmag.com) | |
| |
| |
International Service Technology Symposium (www.servicetechsymposium.com) | |
| |
| |
What Is Cloud? (www.whatiscloud.com) | |
| |
| |
What Is REST? (www.whatisrest.com) | |
| |
| |
Cloud Computing Design Patterns (www.cloudpatterns.org) | |
| |
| |
Service-Orientation (www.serviceorientation.com) | |
| |
| |
CloudSchool.com Certified Cloud (CCP) Professional (www.cloudschool.com) | |
| |
| |
SOASchool.com SOA Certified (SOACP) Professional (www.soaschool.com) | |
| |
| |
Notification Service | |
| |
| |
| |
Case Study Background | |
| |
| |
| |
Case Study #1: ATN | |
| |
| |
Technical Infrastructure and Environment | |
| |
| |
Business Goals and New Strategy | |
| |
| |
Roadmap and Implementation Strategy | |
| |
| |
| |
Case Study #2: DTGOV | |
| |
| |
Technical Infrastructure and Environment | |
| |
| |
Business Goals and New Strategy | |
| |
| |
Roadmap and Implementation Strategy | |
| |
| |
| |
Case Study #3: Innovartus Technologies Inc | |
| |
| |
Technical Infrastructure and Environment | |
| |
| |
Business Goals and Strategy | |
| |
| |
Roadmap and Implementation Strategy | |
| |
| |
| |
Fundamental Cloud Computing | |
| |
| |
| |
Understanding Cloud Computing | |
| |
| |
| |
Origins and Influences | |
| |
| |
A Brief History | |
| |
| |
Definitions | |
| |
| |
Business Drivers | |
| |
| |
Capacity Planning | |
| |
| |
Cost Reduction | |
| |
| |
Organizational Agility | |
| |
| |
Technology Innovations | |
| |
| |
Clustering | |
| |
| |
Grid Computing | |
| |
| |
Virtualization | |
| |
| |
Technology Innovations vs. Enabling Technologies | |
| |
| |
| |
Basic Concepts and Terminology | |
| |
| |
Cloud | |
| |
| |
IT Resource | |
| |
| |
On-Premise | |
| |
| |
Cloud Consumers and Cloud Providers | |
| |
| |
Scaling | |
| |
| |
Horizontal Scaling | |
| |
| |
Vertical Scaling | |
| |
| |
Cloud Service | |
| |
| |
Cloud Service Consumer | |
| |
| |
| |
Goals and Benefits | |
| |
| |
Reduced Investments and Proportional Costs | |
| |
| |
Increased Scalability | |
| |
| |
Increased Availability and Reliability | |
| |
| |
| |
Risks and Challenges | |
| |
| |
Increased Security Vulnerabilities | |
| |
| |
Reduced Operational Governance Control | |
| |
| |
Limited Portability Between Cloud Providers | |
| |
| |
Multi-Regional Compliance and Legal Issues | |
| |
| |
| |
Fundamental Concepts and Models | |
| |
| |
| |
Roles and Boundaries | |
| |
| |
Cloud Provider | |
| |
| |
Cloud Consumer | |
| |
| |
Cloud Service Owner | |
| |
| |
Cloud Resource Administrator | |
| |
| |
Additional Roles | |
| |
| |
Organizational Boundary | |
| |
| |
Trust Boundary | |
| |
| |
| |
Cloud Characteristics | |
| |
| |
On-Demand Usage | |
| |
| |
Ubiquitous Access | |
| |
| |
Multitenancy (and Resource Pooling) | |
| |
| |
Elasticity | |
| |
| |
Measured Usage | |
| |
| |
Resiliency | |
| |
| |
| |
Cloud Delivery Models | |
| |
| |
Infrastructure-as-a-Service (IaaS) | |
| |
| |
Platform-as-a-Service (PaaS) | |
| |
| |
Software-as-a-Service (SaaS) | |
| |
| |
Comparing Cloud Delivery Models | |
| |
| |
Combining Cloud Delivery Models | |
| |
| |
IaaS + PaaS | |
| |
| |
IaaS + PaaS + SaaS | |
| |
| |
| |
Cloud Deployment Models | |
| |
| |
Public Clouds | |
| |
| |
Community Clouds | |
| |
| |
Private Clouds | |
| |
| |
Hybrid Clouds | |
| |
| |
Other Cloud Deployment Models | |
| |
| |
| |
Cloud-Enabling Technology | |
| |
| |
| |
Broadband Networks and Internet Architecture | |
| |
| |
Internet Service Providers (ISPs) | |
| |
| |
Connectionless Packet Switching (Datagram Networks) | |
| |
| |
Router-Based Interconnectivity | |
| |
| |
Physical Network | |
| |
| |
Transport Layer Protocol | |
| |
| |
Application Layer Protocol | |
| |
| |
Technical and Business Considerations | |
| |
| |
Connectivity Issues | |
| |
| |
Network Bandwidth and Latency Issues | |
| |
| |
Cloud Carrier and Cloud Provider Selection | |
| |
| |
| |
Data Center Technology | |
| |
| |
Virtualization | |
| |
| |
Standardization and Modularity | |
| |
| |
Automation | |
| |
| |
Remote Operation and Management | |
| |
| |
High Availability | |
| |
| |
Security-Aware Design, Operation, and Management | |
| |
| |
Facilities | |
| |
| |
Computing Hardware | |
| |
| |
Storage Hardware | |
| |
| |
Network Hardware | |
| |
| |
Carrier and External Networks Interconnection | |
| |
| |
Web-Tier Load Balancing and Acceleration | |
| |
| |
LAN Fabric | |
| |
| |
SAN Fabric | |
| |
| |
NAS Gateways | |
| |
| |
Other Considerations | |
| |
| |
| |
Virtualization Technology | |
| |
| |
Hardware Independence | |
| |
| |
Server Consolidation | |
| |
| |
Resource Replication | |
| |
| |
Operating System-Based Virtualization | |
| |
| |
Hardware-Based Virtualization | |
| |
| |
Virtualization Management | |
| |
| |
Other Considerations | |
| |
| |
| |
Web Technology | |
| |
| |
Basic Web Technology | |
| |
| |
Web Applications | |
| |
| |
| |
Multitenant Technology | |
| |
| |
| |
Service Technology | |
| |
| |
Web Services | |
| |
| |
REST Services | |
| |
| |
Service Agents | |
| |
| |
Service Middleware | |
| |
| |
| |
Case Study Example | |
| |
| |
| |
Fundamental Cloud Security | |
| |
| |
| |
Basic Terms and Concepts | |
| |
| |
Confidentiality | |
| |
| |
Integrity | |
| |
| |
Authenticity | |
| |
| |
Availability | |
| |
| |
Threat | |
| |
| |
Vulnerability | |
| |
| |
Risk | |
| |
| |
Security Controls | |
| |
| |
Security Mechanisms | |
| |
| |
Security Policies | |
| |
| |
| |
Threat Agents | |
| |
| |
Anonymous Attacker | |
| |
| |
Malicious Service Agent | |
| |
| |
Trusted Attacker | |
| |
| |
Malicious Insider | |
| |
| |
| |
Cloud Security Threats | |
| |
| |
Traffic Eavesdropping | |
| |
| |
Malicious Intermediary | |
| |
| |
Denial of Service | |
| |
| |
Insufficient Authorization | |
| |
| |
Virtualization Attack | |
| |
| |
Overlapping Trust Boundaries | |
| |
| |
| |
Additional Considerations | |
| |
| |
Flawed Implementations | |
| |
| |
Security Policy Disparity | |
| |
| |
Contracts | |
| |
| |
Risk Management | |
| |
| |
| |
Case Study Example | |
| |
| |
| |
Cloud Computing Mechanisms | |
| |
| |
| |
Cloud Infrastructure Mechanisms | |
| |
| |
| |
Logical Network Perimeter | |
| |
| |
Case Study Example | |
| |
| |
| |
Virtual Server | |
| |
| |
Case Study Example | |
| |
| |
| |
Cloud Storage Device | |
| |
| |
Cloud Storage Levels | |
| |
| |
Network Storage Interfaces | |
| |
| |
Object Storage Interfaces | |
| |
| |
Database Storage Interfaces | |
| |
| |
Relational Data Storage | |
| |
| |
Non-Relational Data Storage | |
| |
| |
Case Study Example | |
| |
| |
| |
Cloud Usage Monitor | |
| |
| |
Monitoring Agent | |
| |
| |
Resource Agent | |
| |
| |
Polling Agent | |
| |
| |
Case Study Example | |
| |
| |
| |
Resource Replication | |
| |
| |
Case Study Example | |
| |
| |
| |
Ready-Made Environment | |
| |
| |
Case Study Example | |
| |
| |
| |
Specialized Cloud Mechanisms | |
| |
| |
| |
Automated Scaling Listener | |
| |
| |
Case Study Example | |
| |
| |
| |
Load Balancer | |
| |
| |
Case Study Example | |
| |
| |
| |
SLA Monitor | |
| |
| |
Case Study Example | |
| |
| |
SLA Monitor Polling Agent | |
| |
| |
SLA Monitoring Agent | |
| |
| |
| |
Pay-Per-Use Monitor | |
| |
| |
Case Study Example | |
| |
| |
| |
Audit Monitor | |
| |
| |
Case Study Example | |
| |
| |
| |
Failover System | |
| |
| |
Active-Active | |
| |
| |
Active-Passive | |
| |
| |
Case Study Example | |
| |
| |
| |
Hypervisor | |
| |
| |
Case Study Example | |
| |
| |
| |
Resource Cluster | |
| |
| |
Case Study Example | |
| |
| |
| |
Multi-Device Broker | |
| |
| |
Case Study Example | |
| |
| |
| |
State Management Database | |
| |
| |
Case Study Example | |
| |
| |
| |
Cloud Management Mechanisms | |
| |
| |
| |
Remote Administration System | |
| |
| |
Case Study Example | |
| |
| |
| |
Resource Management System | |
| |
| |
Case Study Example | |
| |
| |
| |
SLA Management System | |
| |
| |
Case Study Example | |
| |
| |
| |
Billing Management System | |
| |
| |
Case Study Example | |
| |
| |
| |
Cloud Security Mechanisms | |
| |
| |
| |
Encryption | |
| |
| |
Symmetric Encryption | |
| |
| |
Asymmetric Encryption | |
| |
| |
Case Study Example | |
| |
| |
| |
Hashing | |
| |
| |
Case Study Example | |
| |
| |
| |
Digital Signature | |
| |
| |
Case Study Example | |
| |
| |
| |
Public Key Infrastructure (PKI) | |
| |
| |
Case Study Example | |
| |
| |
| |
Identity and Access Management (IAM) | |
| |
| |
Case Study Example | |
| |
| |
| |
Single Sign-On (SSO) | |
| |
| |
Case Study Example | |
| |
| |
| |
Cloud-Based Security Groups | |
| |
| |
Case Study Example | |
| |
| |
| |
Hardened Virtual Server Images | |
| |
| |
Case Study Example | |
| |
| |
| |
Cloud Computing Architecture | |
| |
| |
| |
Fundamental Cloud Architectures | |
| |
| |
| |
Workload Distribution Architecture | |
| |
| |
| |
Resource Pooling Architecture | |
| |
| |
| |
Dynamic Scalability Architecture | |
| |
| |
| |
Elastic Resource Capacity Architecture | |
| |
| |
| |
Service Load Balancing Architecture | |
| |
| |
| |
Cloud Bursting Architecture | |
| |
| |
| |
Elastic Disk Provisioning Architecture | |
| |
| |
| |
Redundant Storage Architecture | |
| |
| |
| |
Case Study Example | |
| |
| |
| |
Advanced Cloud Architectures | |
| |
| |
| |
Hypervisor Clustering Architecture | |
| |
| |
| |
Load Balanced Virtual Server Instances Architecture | |
| |
| |
| |
Non-Disruptive Service Relocation Architecture | |
| |
| |
| |
Zero Downtime Architecture | |
| |
| |
| |
Cloud Balancing Architecture | |
| |
| |
| |
Resource Reservation Architecture | |
| |
| |
| |
Dynamic Failure Detection and Recovery Architecture | |
| |
| |
| |
Bare-Metal Provisioning Architecture | |
| |
| |
| |
Rapid Provisioning Architecture | |
| |
| |
| |
Storage Workload Management Architecture | |
| |
| |
| |
Case Study Example | |
| |
| |
| |
Specialized Cloud Architectures | |
| |
| |
| |
Direct I/O Access Architecture | |
| |
| |
| |
Direct LUN Access Architecture | |
| |
| |
| |
Dynamic Data Normalization Architecture | |
| |
| |
| |
Elastic Network Capacity Architecture | |
| |
| |
| |
Cross-Storage Device Vertical Tiering Architecture | |
| |
| |
| |
Intra-Storage Device Vertical Data Tiering Architecture | |
| |
| |
| |
Load Balanced Virtual Switches Architecture | |
| |
| |
| |
Multipath Resource Access Architecture | |
| |
| |
| |
Persistent Virtual Network Configuration Architecture | |
| |
| |
| |
Redundant Physical Connection for Virtual Servers Architecture | |
| |
| |
| |
Storage Maintenance Window Architecture | |
| |
| |
| |
Working With Clouds | |
| |
| |
| |
Cloud Delivery Model Considerations | |
| |
| |
| |
Cloud Delivery Models: The Cloud Provider Perspective | |
| |
| |
Building IaaS Environments | |
| |
| |
Data Centers | |
| |
| |
Scalability and Reliability | |
| |
| |
Monitoring | |
| |
| |
Security | |
| |
| |
Equipping PaaS Environments | |
| |
| |
Scalability and Reliability | |
| |
| |
Monitoring | |
| |
| |
Security | |
| |
| |
Optimizing SaaS Environments | |
| |
| |
Security | |
| |
| |
| |
Cloud Delivery Models: The Cloud Consumer Perspective | |
| |
| |
Working with IaaS Environments | |
| |
| |
IT Resource Provisioning Considerations | |
| |
| |
Working with PaaS Environments | |
| |
| |
IT Resource Provisioning Considerations | |
| |
| |
Working with SaaS Services | |
| |
| |
| |
Case Study Example | |
| |
| |
| |
Cost Metrics and Pricing Models | |
| |
| |
| |
Business Cost Metrics | |
| |
| |
Up-Front and On-Going Costs | |
| |
| |
Additional Costs | |
| |
| |
Case Study Example | |
| |
| |
Product Catalog Browser | |
| |
| |
On-Premise Up-Front Costs | |
| |
| |
On-Premise On-Going Costs | |
| |
| |
Cloud-Based Up-Front Costs | |
| |
| |
Cloud-Based On-Going Costs | |
| |
| |
Client Database | |
| |
| |
On-Premise Up-Front Costs | |
| |
| |
On-Premise On-Going Costs | |
| |
| |
Cloud-Based Up-Front Costs | |
| |
| |
Cloud-Based On-Going Costs | |
| |
| |
| |
Cloud Usage Cost Metrics | |
| |
| |
Network Usage | |
| |
| |
Inbound Network Usage Metric | |
| |
| |
Outbound Network Usage Metric | |
| |
| |
Intra-Cloud WAN Usage Metric | |
| |
| |
Server Usage | |
| |
| |
On-Demand Virtual Machine Instance Allocation Metric | |
| |
| |
Reserved Virtual Machine Instance Allocation Metric | |
| |
| |
Cloud Storage Device Usage | |
| |
| |
On-Demand Storage Space Allocation Metric | |
| |
| |
I/O Data Transferred Metric | |
| |
| |
Cloud Service Usage | |
| |
| |
Application Subscription Duration Metric | |
| |
| |
Number of Nominated Users Metric | |
| |
| |
Number of Transactions Users Metric | |
| |
| |
| |
Cost Management Considerations | |
| |
| |
Pricing Models | |
| |
| |
Additional Considerations | |
| |
| |
Case Study Example | |
| |
| |
Virtual Server On-Demand Instance Allocation | |
| |
| |
Virtual Server Reserved Instance Allocation | |
| |
| |
Cloud Storage Device | |
| |
| |
WAN Traffic | |
| |
| |
| |
Service Quality Metrics and SLAs | |
| |
| |
| |
Service Quality Metrics | |
| |
| |
Service Availability Metrics | |
| |
| |
Availability Rate Metric | |
| |
| |
Outage Duration Metric | |
| |
| |
Service Reliability Metrics | |
| |
| |
Mean-Time Between Failures (MTBF) Metric | |
| |
| |
Reliability Rate Metric | |
| |
| |
Service Performance Metrics | |
| |
| |
Network Capacity Metric | |
| |
| |
Storage Device Capacity Metric | |
| |
| |
Server Capacity Metric | |
| |
| |
Web Application Capacity Metric | |
| |
| |
Instance Starting Time Metric | |
| |
| |
Response Time Metric | |
| |
| |
Completion Time Metric | |
| |
| |
Service Scalability Metrics | |
| |
| |
Storage Scalability (Horizontal) Metric | |
| |
| |
Server Scalability (Horizontal) Metric | |
| |
| |
Server Scalability (Vertical) Metric | |
| |
| |
Service Resiliency Metrics | |
| |
| |
Mean-Time to Switchover (MTSO) Metric | |
| |
| |
Mean-Time System Recovery (MTSR) Metric | |
| |
| |
| |
Case Study Example | |
| |
| |
| |
SLA Guidelines | |
| |
| |
| |
Case Study Example | |
| |
| |
Scope and Applicability | |
| |
| |
Service Quality Guarantees | |
| |
| |
Definitions | |
| |
| |
Usage of Financial Credits | |
| |
| |
SLA Exclusions | |
| |
| |
| |
Appendices | |
| |
| |
| |
Case Study Conclusions | |
| |
| |
| |
ATN | |
| |
| |
| |
DTGOV | |
| |
| |
| |
Innovartus | |
| |
| |
| |
Industry Standards Organizations | |
| |
| |
| |
National Institute of Standards and Technology (NIST) | |
| |
| |
| |
Cloud Security Alliance (CSA) | |
| |
| |
| |
Distributed Management Task Force (DMTF) | |
| |
| |
| |
Storage Networking Industry Association (SNIA) | |
| |
| |
| |
Organization for the Advancement of Structured Information Standards (OASIS) | |
| |
| |
| |
The Open Group | |
| |
| |
| |
Open Cloud Consortium (OCC) | |
| |
| |
| |
European Telecommunications Standards Institute (ETSI) | |
| |
| |
| |
Telecommunications Industry Association (TIA) | |
| |
| |
| |
Liberty Alliance | |
| |
| |
| |
Open Grid Forum (OGF) | |
| |
| |
| |
Mapping Mechanisms to Characteristics | |
| |
| |
| |
Data Center Facilities (TIA-942) | |
| |
| |
| |
Primary Rooms | |
| |
| |
Electrical Room | |
| |
| |
Mechanical Room | |
| |
| |
Storage and Staging | |
| |
| |
Offices, Operations Center, and Support | |
| |
| |
Telecommunications Entrance | |
| |
| |
Computer Room | |
| |
| |
| |
Environmental Controls | |
| |
| |
External Electrical Power Provider Interconnection | |
| |
| |
Power Distribution | |
| |
| |
Uninterruptible Power Source (UPS) | |
| |
| |
Power Engine-Generator | |
| |
| |
| |
Infrastructure Redundancy Summary | |
| |
| |
| |
Emerging Technologies | |
| |
| |
| |
Autonomic Computing | |
| |
| |
| |
Grid Computing | |
| |
| |
Service Grids | |
| |
| |
| |
Cloud Provisioning Contracts | |
| |
| |
| |
Cloud Provisioning Contract Structure | |
| |
| |
Terms of Service | |
| |
| |
Service Usage Policy | |
| |
| |
Security and Privacy Policy | |
| |
| |
Warranties and Liabilities | |
| |
| |
Rights and Responsibilities | |
| |
| |
Termination and Renewal | |
| |
| |
Specifications and SLAs | |
| |
| |
Pricing and Billing | |
| |
| |
Other Issues | |
| |
| |
Legal and Compliance Issues | |
| |
| |
Auditability and Accountability | |
| |
| |
Changes in the Contract Terms and Conditions | |
| |
| |
| |
Cloud Provider Selection Guidelines | |
| |
| |
Cloud Provider Viability | |
| |
| |
| |
Cloud Business Case Template | |
| |
| |
| |
Business Case Identification | |
| |
| |
| |
Business Needs | |
| |
| |
| |
Target Cloud Environment | |
| |
| |
| |
Technical Issues | |
| |
| |
| |
Economic Factors | |
| |
| |
About the Authors | |
| |
| |
About the Foreword Contributor | |
| |
| |
About the Contributors | |
| |
| |
Index | |