|
1 Introduction to Cloud Computing |
|
|
1 | (32) |
|
|
2 | (1) |
|
1.2 Computing Models for Software Architecture of Enterprise Applications |
|
|
3 | (7) |
|
1.2.1 Monolithic Centralized Computing |
|
|
3 | (1) |
|
|
4 | (1) |
|
1.2.3 Client-Server Model |
|
|
5 | (5) |
|
1.3 Computing Models for High Performance |
|
|
10 | (7) |
|
|
10 | (4) |
|
|
14 | (3) |
|
1.4 Computing Models to Sell Information Technology Resources |
|
|
17 | (14) |
|
|
17 | (1) |
|
1.4.2 What's the Point of Cloud Computing? |
|
|
17 | (14) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
2 Fundamentals of Cloud Computing |
|
|
33 | (36) |
|
2.1 Essential Needs of Enterprises and How They Are Fulfilled by the Unique Features of Cloud Computing |
|
|
34 | (4) |
|
2.1.1 Scalability and On-Demand Provisioning |
|
|
34 | (2) |
|
2.1.2 Self-service Access |
|
|
36 | (1) |
|
2.1.3 Resource Pooling and Multi-tenancy |
|
|
36 | (1) |
|
|
36 | (2) |
|
2.1.5 Measured Service and Pay-as-Per-Use Pricing Model |
|
|
38 | (1) |
|
2.2 Architecture of Cloud |
|
|
38 | (3) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (2) |
|
2.3 Deployment Models for Cloud Services |
|
|
41 | (9) |
|
2.3.1 Public Cloud Deployment |
|
|
41 | (2) |
|
2.3.2 Private Cloud Deployment |
|
|
43 | (3) |
|
2.3.3 Hybrid Cloud Deployment |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (6) |
|
2.4.1 Infrastructure as a Service |
|
|
50 | (2) |
|
2.4.2 Platform as a Service |
|
|
52 | (3) |
|
2.4.3 Software as a Service |
|
|
55 | (1) |
|
2.5 Brief Overview of Existing Public Cloud Service Providers |
|
|
56 | (10) |
|
2.5.1 Amazon Elastic Compute Cloud (EC2) |
|
|
57 | (1) |
|
2.5.2 Amazon Simple Storage Service |
|
|
58 | (3) |
|
|
61 | (1) |
|
|
62 | (2) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (2) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (2) |
|
3 Technological Foundations of Cloud Computing |
|
|
69 | (28) |
|
3.1 Basic Foundations of Cloud Computing |
|
|
70 | (1) |
|
3.2 Technological Drivers of Cloud Computing |
|
|
71 | (2) |
|
3.3 Multi-core Technology and Parallel Programming Models |
|
|
73 | (1) |
|
|
74 | (14) |
|
3.4.1 Server Virtualization |
|
|
76 | (6) |
|
3.4.2 Storage Virtualization |
|
|
82 | (1) |
|
3.4.3 Network Virtualization |
|
|
83 | (2) |
|
3.4.4 Memory Virtualization |
|
|
85 | (1) |
|
3.4.5 Desktop Virtualization |
|
|
85 | (1) |
|
3.4.6 Data Virtualization |
|
|
85 | (2) |
|
3.4.7 Application Virtualization |
|
|
87 | (1) |
|
3.5 Service-Oriented Architecture (SOA) and Cloud Computing |
|
|
88 | (3) |
|
3.6 Grid and Utility Computing Technologies |
|
|
91 | (1) |
|
3.7 Web 2.0 for Cloud Computing |
|
|
91 | (1) |
|
3.8 Microservices Architecture (MSA), DevOps, and Agile |
|
|
92 | (1) |
|
3.9 Software-Defined Networking and Software-Defined Security |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
95 | (2) |
|
|
97 | (36) |
|
4.1 Fundamental Concepts of Networking |
|
|
98 | (4) |
|
4.1.1 Basic Networking Devices (Hubs, Switches, Bridges, Routers, Gateways) |
|
|
98 | (4) |
|
4.2 Overview of Enterprise Networks and Internetworking |
|
|
102 | (3) |
|
4.3 Network Design Requirements and Design Goals |
|
|
105 | (1) |
|
4.4 Standard Network Models |
|
|
106 | (6) |
|
4.4.1 Flat Networking Model |
|
|
107 | (1) |
|
4.4.2 Hierarchical Networking Model |
|
|
108 | (4) |
|
4.5 Modern Network Requirements and Need for Suitable Network Model |
|
|
112 | (2) |
|
4.6 Leaf Spine Architecture |
|
|
114 | (2) |
|
4.7 Need for Programmable/Automatic Network Configuration |
|
|
116 | (1) |
|
4.8 Different Methods of Configuring Network Devices |
|
|
117 | (12) |
|
4.8.1 Manual and Conventional Method for Configuring Network Devices |
|
|
117 | (3) |
|
4.8.2 Early Methods for Automatic Configuration of Network Devices |
|
|
120 | (2) |
|
4.8.3 Software-Defined Networking |
|
|
122 | (7) |
|
4.9 Network Function Virtualization |
|
|
129 | (2) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
131 | (2) |
|
5 Storage Fundamentals and Cloud Storage |
|
|
133 | (50) |
|
|
134 | (2) |
|
5.2 Direct Attached Storage |
|
|
136 | (5) |
|
5.2.1 Architecture of DAS |
|
|
136 | (5) |
|
5.3 Network Attached Storage |
|
|
141 | (3) |
|
5.3.1 Architecture of Network Attached Storage |
|
|
141 | (1) |
|
5.3.2 File-Sharing Concept in Network Attached Storage |
|
|
142 | (2) |
|
|
144 | (1) |
|
5.4.1 Why Do We Need Storage Area Networks? |
|
|
144 | (1) |
|
5.4.2 Concept of a Storage Area Network |
|
|
145 | (1) |
|
5.5 Fiber Channel Storage Area Networks |
|
|
145 | (16) |
|
5.5.1 Architecture of Fiber Channel Storage Area Networks |
|
|
145 | (3) |
|
5.5.2 Fiber Channel Topologies |
|
|
148 | (2) |
|
5.5.3 Fiber Channel Port Types |
|
|
150 | (1) |
|
5.5.4 Fiber Channel Storage Area Network Protocol |
|
|
151 | (6) |
|
5.5.5 How the Fiber Channel Storage Area Network Works: An Overview |
|
|
157 | (1) |
|
5.5.6 Data Access Methods in a Storage Area Network |
|
|
158 | (3) |
|
5.6 Internet Protocol Storage Area Network |
|
|
161 | (8) |
|
5.6.1 Architecture of Internet Protocol Storage Area Network |
|
|
162 | (1) |
|
5.6.2 Storage Protocols for Internet Protocol Storage Area Network |
|
|
163 | (6) |
|
5.7 Converged Enhanced Ethernet |
|
|
169 | (3) |
|
5.7.1 FCoE Storage Area Network |
|
|
170 | (2) |
|
|
172 | (8) |
|
5.8.1 What's the Point of the Cloud and Cloud Storage? |
|
|
172 | (2) |
|
5.8.2 What Form Do Storage Devices Take Inside the Cloud? What Does the Architecture of Cloud Storage Look Like? |
|
|
174 | (2) |
|
5.8.3 Storage Optimization Techniques |
|
|
176 | (4) |
|
5.9 Software-Defined Storage |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (38) |
|
6.1 Basic Security Requirements |
|
|
184 | (6) |
|
6.2 Traditional Enterprise Security Model |
|
|
190 | (1) |
|
6.3 Aspects/Factors that Influence Security in Cloud |
|
|
191 | (1) |
|
6.4 Security Threats in Cloud Computing |
|
|
192 | (26) |
|
6.4.1 General Types of Threats |
|
|
193 | (11) |
|
6.4.2 Threats Due to Virtualization |
|
|
204 | (14) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (3) |
|
|
221 | (20) |
|
7.1 Motivations for Cloud Migration |
|
|
222 | (6) |
|
|
226 | (2) |
|
|
228 | (2) |
|
|
230 | (5) |
|
7.4 Cloud-Ready, Cloud-Optimized, and Cloud-Native Applications |
|
|
235 | (3) |
|
7.5 Pros and Cons of Different Migration Strategies |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
241 | (14) |
|
8.1 Need for Monitoring Cloud |
|
|
242 | (1) |
|
8.2 Characteristics of Cloud Monitoring Systems |
|
|
243 | (1) |
|
|
243 | (1) |
|
8.4 Who Should Monitor and Levels of Monitoring? |
|
|
244 | (2) |
|
8.5 Stages of Cloud Monitoring |
|
|
246 | (3) |
|
8.6 Cloud Monitoring Platforms and Tools |
|
|
249 | (3) |
|
8.7 Challenges in Cloud Monitoring |
|
|
252 | (2) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
9 Basics of Cloud Management |
|
|
255 | (12) |
|
9.1 Need for Cloud Management |
|
|
256 | (2) |
|
9.1.1 Requirements of Cloud Management |
|
|
257 | (1) |
|
9.1.2 Need for Cloud Management Platform Tools |
|
|
257 | (1) |
|
9.2 Core Functions of Cloud Management Platforms |
|
|
258 | (3) |
|
9.3 Architecture of Cloud Management Platforms |
|
|
261 | (5) |
|
9.3.1 VMware Validated Design for Software-Defined Data Center |
|
|
262 | (2) |
|
9.3.2 Cloud Management Platforms: Consolidated View and Architecture |
|
|
264 | (2) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
10 Cloud Service Brokerage |
|
|
267 | (12) |
|
10.1 Need for Cloud Service Brokerage |
|
|
268 | (1) |
|
10.2 Types of Cloud Brokers |
|
|
269 | (1) |
|
10.3 Benefits of Cloud Brokerage Solutions |
|
|
270 | (1) |
|
10.4 Generic Architecture of Cloud Service Broker |
|
|
271 | (2) |
|
10.5 Cloud Service Brokerage Tools |
|
|
273 | (4) |
|
|
273 | (2) |
|
10.5.2 IBM Cloud Brokerage |
|
|
275 | (2) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (2) |
|
|
279 | (12) |
|
11.1 Emergence of Hybrid Cloud and Multi-cloud Environments |
|
|
280 | (3) |
|
11.1.1 Challenges in Managing Hybrid Cloud and Multi-cloud Environments |
|
|
281 | (2) |
|
|
283 | (4) |
|
11.2.1 Types of Orchestration |
|
|
284 | (2) |
|
11.2.2 Key Functions of Orchestration Engine |
|
|
286 | (1) |
|
11.3 Some Leading Cloud Orchestration Tools |
|
|
287 | (2) |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
289 | (2) |
|
|
291 | (14) |
|
12.1 Disaster Recovery and Its Requirements |
|
|
292 | (1) |
|
12.2 Benefits of Cloud for Disaster Recovery |
|
|
292 | (2) |
|
12.3 Primary Components for Disaster Recovery |
|
|
294 | (1) |
|
12.4 Designing a Disaster Recovery Plan |
|
|
294 | (2) |
|
12.5 Proven Disaster Recovery Approaches |
|
|
296 | (1) |
|
12.6 Implementation of Disaster Recovery Using Cloud |
|
|
297 | (2) |
|
12.7 Disaster Recovery--Best Practices |
|
|
299 | (2) |
|
12.8 Prominent Workloads for Disaster Recovery |
|
|
301 | (1) |
|
12.9 Disaster Recovery as a Service |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
Index |
|
305 | |