109,99 €
Cloud Services, Networking and Management provides a comprehensive overview of the cloud infrastructure and services, as well as their underlying management mechanisms, including data center virtualization and networking, cloud security and reliability, big data analytics, scientific and commercial applications. Special features of the book include: * State-of-the-art content * Self-contained chapters for readers with specific interests * Includes commercial applications on Cloud (video services and games)
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 821
Veröffentlichungsjahr: 2015
IEEE Press445 Hoes LanePiscataway, NJ 08854
IEEE Press Editorial BoardTariq Samad, Editor in Chief
Kenneth Moore, Director of IEEE Book and Information Services (BIS)
COVER
TITLE PAGE
PREFACE
CONTRIBUTORS
PART I: BASIC CONCEPTS AND ENABLING TECHNOLOGIES
1 CLOUD ARCHITECTURES, NETWORKS, SERVICES, AND MANAGEMENT
1.1 INTRODUCTION
1.2 PART I: INTRODUCTION TO CLOUD COMPUTING
1.3 PART II: RESEARCH CHALLENGES—THE CHAPTERS IN THIS BOOK
1.4 CONCLUSION
REFERENCES
2 VIRTUALIZATION IN THE CLOUD
2.1 THE NEED FOR VIRTUALIZATION MANAGEMENT IN THE CLOUD
2.2 BASIC CONCEPTS
2.3 VIRTUALIZED ELEMENTS
2.4 VIRTUALIZATION OPERATIONS
2.5 INTERFACES FOR VIRTUALIZATION MANAGEMENT
2.6 TOOLS AND SYSTEMS
2.7 CHALLENGES
REFERENCES
3 VIRTUAL MACHINE MIGRATION
3.1 INTRODUCTION
3.2 VM MIGRATION
3.3 VIRTUAL NETWORK MIGRATION WITHOUT PACKET LOSS
3.4 SECURITY OF VIRTUAL ENVIRONMENTS
3.5 FUTURE DIRECTIONS
3.6 CONCLUSION
REFERENCES
PART II: CLOUD NETWORKING AND COMMUNICATIONS
4 DATACENTER NETWORKS AND RELEVANT STANDARDS
4.1 OVERVIEW
4.2 TOPOLOGIES
4.3 NETWORK EXPANSION
4.4 TRAFFIC
4.5 ROUTING
4.6 ADDRESSING
4.7 RESEARCH CHALLENGES
4.8 SUMMARY
REFERENCES
5 INTER-DATA-CENTER NETWORKS WITH MINIMUM OPERATIONAL COSTS
5.1 INTRODUCTION
5.2 INTER-DATA-CENTER NETWORK VIRTUALIZATION
5.3 IDC NETWORK DESIGN WITH MINIMUM ELECTRIC BILLS
5.4 INTER-DATA-CENTER NETWORK DESIGN WITH MINIMUM DOWNTIME PENALTIES
5.5 OVERCOMING ENERGY VERSUS RESILIENCE TRADE-OFF
5.6 SUMMARY AND DISCUSSIONS
REFERENCES
6 OPENFLOW AND SDN FOR CLOUDS
6.1 INTRODUCTION
6.2 SDN, CLOUD COMPUTING, AND VIRTUALIZATION CHALLENGES
6.3 SOFTWARE-DEFINED NETWORKING
6.4 OVERVIEW OF CLOUD COMPUTING AND OPENSTACK
6.5 SDN FOR CLOUD COMPUTING
6.6 COMBINING OPENFLOW AND OPENSTACK WITH OPENDAYLIGHT
6.7 SOFTWARE-DEFINED INFRASTRUCTURES
6.8 RESEARCH TRENDS AND CHALLENGES
6.9 CONCLUDING REMARKS
REFERENCES
7 MOBILE CLOUD COMPUTING
7.1 INTRODUCTION
7.2 MOBILE CLOUD COMPUTING
7.3 RISKS IN MCC
7.4 RISK MANAGEMENT FOR MCC
7.5 CONCLUSIONS
REFERENCES
PART III: CLOUD MANAGEMENT
8 ENERGY CONSUMPTION OPTIMIZATION IN CLOUD DATA CENTERS
8.1 INTRODUCTION
8.2 ENERGY CONSUMPTION IN DATA CENTERS: COMPONENTS AND MODELS
8.3 ENERGY EFFICIENT SYSTEM-LEVEL OPTIMIZATION OF DATA CENTERS
8.4 CONCLUSIONS AND OPEN CHALLENGES
REFERENCES
9 PERFORMANCE MANAGEMENT AND MONITORING
9.1 INTRODUCTION
9.2 BACKGROUND CONCEPTS
9.3 RELATED WORK
9.4 X-CLOUD APPLICATION MANAGEMENT PLATFORM
9.5 IMPLEMENTATION
9.6 EXPERIMENTS AND A CASE STUDY
9.7 CHALLENGES IN MANAGEMENT ON HETEROGENEOUS CLOUDS
9.8 CONCLUSION
ACKNOWLEDGMENTS
REFERENCES
10 RESOURCE MANAGEMENT AND SCHEDULING
10.1 INTRODUCTION
10.2 BASIC CONCEPTS
10.3 APPLICATIONS
10.4 PROBLEM DEFINITION
10.5 RESOURCE MANAGEMENT AND SCHEDULING IN CLOUDS
10.6 CHALLENGES AND PERSPECTIVES
10.7 CONCLUSION
REFERENCES
11 CLOUD SECURITY
11.1 INTRODUCTION
11.2 TECHNICAL BACKGROUND
11.3 EXISTING SOLUTIONS
11.4 TRANSFORMING TO THE NEW IDPS CLOUD SECURITY SOLUTIONS
11.5 FLOWIPS: DESIGN AND IMPLEMENTATION
11.6 FLOWIPS VS SNORT/IPTABLES IPS
11.7 NETWORK RECONFIGURATION
11.8 PERFORMANCE COMPARISON
11.9 OPEN ISSUES AND FUTURE WORK
11.10 CONCLUSION
ACKNOWLEDGMENTS
REFERENCES
12 SURVIVABILITY AND FAULT TOLERANCE IN THE CLOUD
12.1 INTRODUCTION
12.2 BACKGROUND
12.3 FAILURE CHARACTERIZATION IN CLOUD ENVIRONMENTS
12.4 AVAILABILITY-AWARE RESOURCE ALLOCATION SCHEMES
12.5 CONCLUSION
REFERENCES
PART IV: CLOUD APPLICATIONS AND SERVICES
13 SCIENTIFIC APPLICATIONS ON CLOUDS
13.1 INTRODUCTION
13.2 BACKGROUND INFORMATION
13.3 RELATED WORK
13.4 IWIR WORKFLOW MODEL
13.5 AMAZON SWF BACKGROUND
13.6 RAINCLOUD WORKFLOW
13.7 IWIR-TO-SWF CONVERSION
13.8 EXPERIMENTS
13.9 OPEN CHALLENGES
13.10 CONCLUSION
ACKNOWLEDGMENTS
REFERENCES
14 INTERACTIVE MULTIMEDIA APPLICATIONS ON CLOUDS
14.1 INTRODUCTION
14.2 DELIVERY MODELS FOR INTERACTIVE MULTIMEDIA SERVICES
14.3 CLOUD GAMING
14.4 UGC LIVE STREAMING
14.5 TIME-SHIFTING VIDEO STREAMING
14.6 OPEN CHALLENGES
14.7 CONCLUSION
REFERENCES
15 BIG DATA ON CLOUDS (BDOC)
15.1 INTRODUCTION
15.2 HISTORICAL PERSPECTIVE AND STATE OF THE ART
15.3 CLOUDS—SUPPLY AND DEMAND OF BIG DATA
15.4 EMERGING BUSINESS APPLICATIONS
15.5 CLOUD AND SERVICE AVAILABILITY
15.6 BDOC SECURITY ISSUES
15.7 BDOC LEGAL ISSUES
15.8 ENABLING FUTURE SUCCESS—STEM CULTIVATION AND OUTREACH
15.9 OPEN CHALLENGES AND FUTURE DIRECTIONS
15.10 CONCLUSIONS
REFERENCES
INDEX
IEEE PRESS SERIES ON: NETWORKS AND SERVICES MANAGEMENT
END USER LICENSE AGREEMENT
Chapter 03
TABLE 3.1. Comparison of offline and live migration techniques
TABLE 3.2. Comparison of migrating I/O virtualization techniques
Chapter 04
TABLE 4.1. Comparison among datacenter network topologies
Chapter 05
TABLE 5.1. The notation used in the virtualization scheme
TABLE 5.2. The notation used in inter-data-center workload migration algorithm
TABLE 5.3. Summary of the virtual inter-data-center network design schemes studied in this chapter
Chapter 06
TABLE 6.1. Components of a flow entry in a flow table
TABLE 6.2. Meter entry in meter table; Meter band in meter entry
Chapter 07
TABLE 7.1. Overview of risk factors in mobile clouds
TABLE 7.2. Example of effects on risk probabilities and impacts
TABLE 7.3. Framework analysis
Chapter 11
TABLE 11.1. Network reconfiguration actions
TABLE 11.2. FlowIPS actions selection guidance
Chapter 12
TABLE 12.1. Availability vs. daily and monthly downtimes
TABLE 12.2. Network reconfiguration actions
Chapter 14
TABLE 14.1 . Number of channels for top categories
TABLE 14.2 . Ratio of video portions from P2P vs. DC
Chapter 01
Figure 1.1. Typical architecture in a cloud computing environment.
Figure 1.2. Cloud computing business model.
Chapter 02
Figure 2.1. Virtualized cloud network infrastructure.
Chapter 03
Figure 3.1. General Xen-based virtualization architecture. The hachured areas, administrative domain and hypervisor, indicate the most sensitive software modules because they run on highest privilege level.
Figure 3.2. I/O virtualization modes. (a) Network I/O virtualization with paravirtualized drivers. Administrative domain centralizes all I/O operations. (b) Direct I/O network virtualization. A network interface card is directly connected to virtual machine.
Figure 3.3. Hardware-assisted network I/O virtualization modes. (a) Network I/O virtualization with SR-IOV. Virtual machines directly access NIC virtual functions. (b) Network I/O virtualization with VMDq. Virtual machines access device queues through a paravirtualized driver.
Figure 3.4. XenFlow architecture overview. Xen virtual router data plane is copied to physical host OpenFlow switch. Network controller orchestrates virtual router and link migration.
Figure 3.5. XenFlow virtual topology migration. (1) Virtual machine and all running routing protocol migration. (2) Data plane reconstruction based on control plane information. (3) Link migration by sending a predefined ARP Reply message.
Chapter 04
Figure 4.1. A canonical three-tiered tree-like datacenter network topology.
Figure 4.2. Clos-based topologies. (a) VL2 and (b) Fat-tree.
Figure 4.3. OSA adapts according to demands (adapted from Ref. [17]).
Figure 4.4. Hybrid switch/server topologies. (a) Two-level DCell and (b) two-level BCube.
Figure 4.5. Example of 3-ary CamCube topology (adapted from Ref. [21]).
Figure 4.6. Legup’s overview (adapted from Ref. [12]).
Figure 4.7. Comparison between (a) Fat-Tree and (b) Jellyfish with identical equipment (adapted from Ref. [13]).
Figure 4.8. PSSR overview (adapted from Ref. [46]).
Figure 4.9. Architecture for address translation in VL2.
Figure 4.10. NetLord’s encapsulation/decapsulation process (adapted from Ref. [71]).
Chapter 05
Figure 5.1. Heterogeneous inter-data-center network [3].
Figure 5.2. Minimalist illustration of inter-data-center network backbone virtualization.
Figure 5.3. Generic virtualization steps for an inter-data-center network.
Figure 5.4. (a) Demand profile in different time zones. (b) ToU rates in different locations of the network.
Figure 5.5. (a) Opex savings in the inter-data-center network. (b) Opex of the network equipment.
Figure 5.6. (a) Outage probability of upstream data center demands. (b) Number of active channels in the virtual inter-data-center network.
Figure 5.7. (a) Power consumption of the inter-data-center network under RPMPC, MOPIC, and POMIP, (b) Outage probability of upstream data center demands under RPMPC, MOPIC, and POMIP.
Chapter 06
Figure 6.1. Physical infrastructure for web browsing use case.
Figure 6.2. Virtual infrastructure for Web browsing use case.
Figure 6.3. SDN layered architecture (from Ref. [5]).
Figure 6.4. OpenFlow switch and controller (from Ref. [9]).
Figure 6.5. Matching of packets against tables (from Ref. [9]).
Figure 6.6. Virtual machines.
Figure 6.7. Conceptual architecture of OpenStack (from Ref. [10]).
Figure 6.8. Typical physical data center networks in OpenStack (from Ref. [10]).
Figure 6.9. Tenant and provider networks (from Ref. [10]).
Figure 6.10. Virtual interfaces connect VMs to virtual switches and to physical interfaces (from Ref. [11]).
Figure 6.11. Open VSwitch (from Ref. [11]).
Figure 6.12. OpenDaylight architecture (from Ref. [18]). VTN, virtual tenant network; oDMC, open dove management console; D4A, defense4A# production; LISP, locator/identifier separation protocol; OCSDB, Open vSwitch data base protocol; BGP, border gateway protocol; PCEP, path computation element communication protocol; SNMP, simple network management protocol.
Figure 6.13. Virtual tenant network architecture (from Ref. [18]).
Figure 6.14. Architecture for managing virtual infrastructures.
Figure 6.15. SAVI SDI resource management system.
Chapter 07
Figure 7.2. Risk hierarchy.
Chapter 08
Figure 8.1. Computing server power consumption.
Figure 8.2. Three-tier data center architecture.
Figure 8.3. DENS metric selection of computing server.
Figure 8.4. Server selection according to load and communication potential.
Figure 8.5. Queue-size related component of the STAB scheduler.
Figure 8.6. Selection of racks and modules by the STAB scheduler.
Figure 8.7. Selection of computing servers by the STAB scheduler.
Figure 8.8. Replication in cloud computing data centers. All database requests produced by the cloud applications running on computing servers are first directed to the rack-level database server. Rack DB either replies with the requested data or forwards the request to the Data center DB. In a similar fashion, the Data center DB either satisfies the request or forwards it up to the Central DB.
Figure 8.9. Downlink bandwidth requirements.
Figure 8.10. Energy and residual bandwidth for (a) Central DB, (b) Data center DB, and (c) Rack DB replication scenarios.
Cover
Table of Contents
Begin Reading
iii
iv
v
xiii
xiv
xv
xvii
xviii
xix
1
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
49
50
51
52
53
55
56
57
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
179
181
183
182
184
185
186
187
188
189
190
191
193
194
195
196
197
198
199
200
202
201
203
204
205
206
207
208
209
210
211
212
213
214
215
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
a1
Edited by
Nelson L. S. da Fonseca
Raouf Boutaba
Copyright © 2015 by The Institute of Electrical and Electronics Engineers, Inc.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey. All rights reservedPublished simultaneously in Canada
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the
Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.
Library of Congress Cataloging-in-Publication Data
Fonseca, Nelson L. S. da. Cloud services, networking, and management / Nelson L. S. da Fonseca, Raouf Boutaba. pages cm
ISBN 978-1-118-84594-3 (cloth)1. Cloud computing. I. Boutaba, Raouf. II. Title. QA76.585.F66 2015 004.67′ 82–dc23
2014037179
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
