Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
About This eBook
Title Page
Copyright Page
Praise for This Book
Dedication Page
Contents at a Glance
Contents
Acknowledgments
Chapter 1. Introduction
Objective of This Book
What This Book Does Not Cover
Who This Book Is For
Origin of This Book
Recommended Reading
How This Book Is Organized
Chapter 3: Sharing, Scaling and Elasticity Patterns
Chapter 4: Reliability, Resiliency and Recovery Patterns
Chapter 5: Data Management and Storage Device Patterns
Chapter 6: Virtual Server and Hypervisor Connectivity and Management Patterns
Chapter 7: Monitoring, Provisioning and Administration Patterns
Chapter 8: Cloud Service and Storage Security Patterns
Chapter 9: Network Security, Identity & Access Management and Trust Assurance Patterns
Chapter 10: Common Compound Patterns
Appendix A: Cloud Computing Mechanisms Glossary
Appendix B: Alphabetical Design Patterns Reference
Additional Information
Symbol Legend
Pattern Documentation Conventions
Updates, Errata, and Resources (www.servicetechbooks.com)
Cloud Computing Design Patterns (www.cloudpatterns.org)
What Is Cloud? (www.whatiscloud.com)
Referenced Specifications (www.servicetechspecs.com)
The Service Technology Magazine (www.servicetechmag.com)
CloudSchool.com™ Certified Cloud (CCP) Professional (www.cloudschool.com)
Social Media and Notification
Chapter 2. Understanding Design Patterns
About Pattern Profiles
Requirement
Icon
Problem
Solution
Application
Mechanisms
About Compound Patterns
Design Pattern Notation
Capitalization
Page Number References
Measures of Design Pattern Application
Working with This Catalog
Chapter 3. Sharing, Scaling and Elasticity Patterns
Shared Resources
Problem
Solution
Application
Mechanisms
Workload Distribution
Problem
Solution
Application
Mechanisms
Dynamic Scalability
Problem
Solution
Application
Mechanisms
Service Load Balancing
Problem
Solution
Application
Mechanisms
Elastic Resource Capacity
Problem
Solution
Application
Mechanisms
Elastic Network Capacity
Problem
Solution
Application
Mechanisms
Elastic Disk Provisioning
Problem
Solution
Application
Mechanisms
Load Balanced Virtual Server Instances
Problem
Solution
Application
Mechanisms
Load Balanced Virtual Switches
Problem
Solution
Application
Mechanisms
Service State Management
Problem
Solution
Application
Mechanisms
Storage Workload Management
Problem
Solution
Application
Mechanisms
Dynamic Data Normalization
Problem
Solution
Application
Mechanisms
Cross-Storage Device Vertical Tiering
Problem
Solution
Application
Mechanisms
Intra-Storage Device Vertical Data Tiering
Problem
Solution
Application
Mechanisms
Memory Over-Committing
Problem
Solution
Application
Mechanisms
NIC Teaming
Problem
Solution
Application
Mechanisms
Broad Access
Problem
Solution
Application
Mechanisms
Chapter 4. Reliability, Resiliency and Recovery Patterns
Resource Pooling
Problem
Solution
Application
Mechanisms
Resource Reservation
Problem
Solution
Application
Mechanisms
Hypervisor Clustering
Problem
Solution
Application
Mechanisms
Redundant Storage
Problem
Solution
Application
Mechanisms
Dynamic Failure Detection and Recovery
Problem
Solution
Application
Mechanisms
Multipath Resource Access
Problem
Solution
Application
Mechanisms
Redundant Physical Connection for Virtual Servers
Problem
Solution
Application
Mechanisms
Synchronized Operating State
Problem
Solution
Application
Mechanisms
Zero Downtime
Problem
Solution
Application
Mechanisms
Storage Maintenance Window
Problem
Solution
Application
Mechanisms
Virtual Server Auto Crash Recovery
Problem
Solution
Application
Mechanisms
Non-Disruptive Service Relocation
Problem
Solution
Application
Mechanisms
Chapter 5. Data Management and Storage Device Patterns
Direct I/O Access
Problem
Solution
Application
Mechanisms
Direct LUN Access
Problem
Solution
Application
Mechanisms
Single Root I/O Virtualization
Problem
Solution
Application
Mechanisms
Cloud Storage Data at Rest Encryption
Problem
Solution
Application
Mechanisms
Cloud Storage Data Lifecycle Management
Problem
Solution
Application
Mechanisms
Cloud Storage Data Management
Problem
Solution
Application
Mechanisms
Cloud Storage Data Placement Compliance Check
Problem
Solution
Application
Mechanisms
Cloud Storage Device Masking
Problem
Solution
Application
Mechanisms
Cloud Storage Device Path Masking
Problem
Solution
Application
Mechanisms
Cloud Storage Device Performance Enforcement
Problem
Solution
Application
Mechanisms
Virtual Disk Splitting
Problem
Solution
Application
Mechanisms
Sub-LUN Tiering
Problem
Solution
Application
Mechanisms
RAID-Based Data Placement
Problem
Solution
Application
Mechanisms
IP Storage Isolation
Problem
Solution
Application
Mechanisms
Chapter 6. Virtual Server and Hypervisor Connectivity and Management Patterns
Virtual Server Folder Migration
Problem
Solution
Application
Mechanisms
Persistent Virtual Network Configuration
Problem
Solution
Application
Mechanisms
Virtual Server Connectivity Isolation
Problem
Solution
Application
Mechanisms
Virtual Switch Isolation
Problem
Solution
Application
Mechanisms
Virtual Server NAT Connectivity
Problem
Solution
Application
Mechanisms
External Virtual Server Accessibility
Problem
Solution
Application
Mechanisms
Cross-Hypervisor Workload Mobility
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Anti-Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Connectivity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Virtual Server Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Virtual Server Anti-Affinity
Problem
Solution
Application
Mechanisms
Stateless Hypervisor
Problem
Solution
Application
Mechanisms
Chapter 7. Monitoring, Provisioning and Administration Patterns
Usage Monitoring
Problem
Solution
Application
Mechanisms
Pay-as-You-Go
Problem
Solution
Application
Mechanisms
Realtime Resource Availability
Problem
Solution
Application
Mechanisms
Rapid Provisioning
Problem
Solution
Application
Mechanisms
Platform Provisioning
Problem
Solution
Application
Mechanisms
Bare-Metal Provisioning
Problem
Solution
Application
Mechanisms
Automated Administration
Problem
Solution
Application
Mechanisms
Centralized Remote Administration
Problem
Solution
Application
Mechanisms
Resource Management
Problem
Solution
Application
Mechanisms
Self-Provisioning
Problem
Solution
Application
Mechanisms
Power Consumption Reduction
Problem
Solution
Application
Mechanisms
Chapter 8. Cloud Service and Storage Security Patterns
Trusted Platform BIOS
Problem
Solution
Application
Mechanisms
Geotagging
Problem
Solution
Application
Mechanisms
Hypervisor Protection
Problem
Solution
Application
Mechanisms
Cloud VM Platform Encryption
Problem
Solution
Application
Mechanisms
Trusted Cloud Resource Pools
Problem
Solution
Application
Mechanisms
Secure Cloud Interfaces and APIs
Problem
Solution
Application
Mechanisms
Cloud Resource Access Control
Problem
Solution
Application
Mechanisms
Detecting and Mitigating User-Installed VMs
Problem
Solution
Application
Mechanisms
Mobile BYOD Security
Problem
Solution
Application
Mechanisms
Cloud Data Breach Protection
Problem
Solution
Application
Mechanisms
Permanent Data Loss Protection
Problem
Solution
Application
Mechanisms
In-Transit Cloud Data Encryption
Problem
Solution
Application
Mechanisms
Chapter 9. Network Security, Identity & Access Management and Trust Assurance Patterns
Secure On-Premise Internet Access
Problem
Solution
Application
Mechanisms
Secure External Cloud Connection
Problem
Solution
Application
Mechanisms
Secure Connection for Scaled VMs
Problem
Solution
Application
Mechanisms
Cloud Denial-of-Service Protection
Problem
Solution
Application
Mechanisms
Cloud Traffic Hijacking Protection
Problem
Solution
Application
Mechanisms
Automatically Defined Perimeter
Problem
Solution
Application
Mechanisms
Cloud Authentication Gateway
Problem
Solution
Application
Mechanisms
Federated Cloud Authentication
Problem
Solution
Application
Mechanisms
Cloud Key Management
Problem
Solution
Application
Mechanisms
Trust Attestation Service
Problem
Solution
Application
Mechanisms
Collaborative Monitoring and Logging
Problem
Solution
Application
Mechanisms
Independent Cloud Auditing
Problem
Solution
Application
Mechanisms
Threat Intelligence Processing
Problem
Solution
Application
Mechanisms
Chapter 10. Common Compound Patterns
“Compound Pattern” vs. “Composite Pattern”
Compound Pattern Members
Joint Application vs. Coexistent Application
Private Cloud
Public Cloud
Software-as-a-Service (SaaS)
Platform-as-a-Service (PaaS)
Infrastructure-as-a-Service (IaaS)
Elastic Environment
Multitenant Environment
Resilient Environment
Cloud Bursting
Burst Out to Private Cloud
Burst Out to Public Cloud
Burst In
Secure Burst Out to Private Cloud/Public Cloud
Cloud Balancing
Cloud Authentication
Resource Workload Management
Isolated Trust Boundary
Appendix A. Cloud Computing Mechanisms Glossary
Application Delivery Controller (ADC)
Attestation Service
Attribute Authority
Attribute-Based Access Control (ABAC) System
Audit Monitor
Authentication Gateway Service (AGS)
Automated Scaling Listener
Automatically Defined Perimeter (ADP) Controller
Billing Management System
Certificate
Certificate Authority (CA)
Certificate Revocation List (CRL)
Certificate Trust Store
Certificate Validation Service (CVS)
Cloud Consumer Gateway (CCG)
Cloud Storage Data Placement Auditor
Cloud Storage Device
Cloud Storage Device Performance Monitor
Cloud Storage Management Portal
Cloud Usage Monitor
Cloud Workload Scheduler
Cloud-based Security Groups
Cryptographic Key Management System (CKMS)
Digital Signature
Domain Name Service (DNS)
Encryption
Endpoint Threat Detection and Response (ETDR)
Enterprise Mobility Management (EMM) System
Failover System
Geotag
Hardened Virtual Server Image
Hardware-Based VM Discovery System
Hardware Security Module (HSM)
Honeypot
Host-Based Security System (HBSS)
Hypervisor
Identity and Access Management (IAM)
Intrusion Detection and Prevention System (IDPS)
Live VM Migration
Load Balancer
Logical Network Perimeter
LUN Masking
Malware Hash
Multi-Device Broker
Network Forensics Monitor
Orchestration Engine
Pay-Per-Use Monitor
Physical Uplink
Platform Trust Policy
Public Key Infrastructure (PKI)
RAID-level Idenfitier
Ready-Made Environment
Remote Administration System
Resource Cluster
Resource Management System
Resource Replication
Sandbox
Secure Token Service (STS)
Security Information and Event Management (SIEM) System
Single Sign-On (SSO)
SLA Management System
SLA Monitor
State Management Database
Storage Path Masking
Sub-LUN Migration
Threat Intelligence System
Traffic Filter
Traffic Monitor
Trusted Platform Module (TPM)
Virtual Appliance
Virtual CPU (vCPU)
Virtual Disk (vDisk)
Virtual Firewall
Virtual Infrastructure Manager (VIM)
Virtual Network
Virtual Private Cloud (VPC)
Virtual Private Network (VPN)
Virtual RAM (vRAM)
Virtual Server
Virtual Server Snapshot
Virtual Server State Manager
Virtual Switch
Virtualization Agent
Virtualization Monitor
VPN Cloud Hub
Appendix B. Alphabetical Design Patterns Reference
About the Authors
Thomas Erl
Robert Cope
Amin Naserpour
Index
← Prev
Back
Next →
← Prev
Back
Next →