Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
About This eBook
Title Page
Copyright Page
Praise for this Book
Dedication Page
Contents at a Glance
Contents
Foreword by Pamela J. Wise-Martinez
Acknowledgments
Chapter 1. Introduction
1.1. Objectives of This Book
1.2. What This Book Does Not Cover
1.3. Who This Book Is For
1.4. How This Book Is Organized
1.5. Conventions
1.6. Additional Information
Chapter 2. Case Study Background
2.1. Case Study #1: ATN
2.2. Case Study #2: DTGOV
2.3. Case Study #3: Innovartus Technologies Inc.
Part I: Fundamental Cloud Computing
Chapter 3. Understanding Cloud Computing
3.1. Origins and Influences
3.2. Basic Concepts and Terminology
3.3. Goals and Benefits
3.4. Risks and Challenges
Chapter 4. Fundamental Concepts and Models
4.1. Roles and Boundaries
4.2. Cloud Characteristics
4.3. Cloud Delivery Models
4.4. Cloud Deployment Models
Chapter 5. Cloud-Enabling Technology
5.1. Broadband Networks and Internet Architecture
5.2. Data Center Technology
5.3. Virtualization Technology
5.4. Web Technology
5.5. Multitenant Technology
5.6. Service Technology
Chapter 6. Fundamental Cloud Security
6.1. Basic Terms and Concepts
6.2. Threat Agents
6.3. Cloud Security Threats
6.4. Additional Considerations
Part II: Cloud Computing Mechanisms
Chapter 7. Cloud Infrastructure Mechanisms
7.1. Logical Network Perimeter
7.2. Virtual Server
7.3. Cloud Storage Device
7.4. Cloud Usage Monitor
7.5. Resource Replication
7.6. Ready-Made Environment
Chapter 8. Specialized Cloud Mechanisms
8.1. Automated Scaling Listener
8.2. Load Balancer
8.3. SLA Monitor
8.4. Pay-Per-Use Monitor
8.5. Audit Monitor
8.6. Failover System
8.7. Hypervisor
8.8. Resource Cluster
8.9. Multi-Device Broker
8.10. State Management Database
Chapter 9. Cloud Management Mechanisms
9.1. Remote Administration System
9.2. Resource Management System
9.3. SLA Management System
9.4. Billing Management System
Chapter 10. Cloud Security Mechanisms
10.1. Encryption
10.2. Hashing
10.3. Digital Signature
10.4. Public Key Infrastructure (PKI)
10.5. Identity and Access Management (IAM)
10.6. Single Sign-On (SSO)
10.7. Cloud-Based Security Groups
10.8. Hardened Virtual Server Images
Part III: Cloud Computing Architecture
Chapter 11. Fundamental Cloud Architectures
11.1. Workload Distribution Architecture
11.2. Resource Pooling Architecture
11.3. Dynamic Scalability Architecture
11.4. Elastic Resource Capacity Architecture
11.5. Service Load Balancing Architecture
11.6. Cloud Bursting Architecture
11.7. Elastic Disk Provisioning Architecture
11.8. Redundant Storage Architecture
Chapter 12. Advanced Cloud Architectures
12.1. Hypervisor Clustering Architecture
12.2. Load Balanced Virtual Server Instances Architecture
12.3. Non-Disruptive Service Relocation Architecture
12.4. Zero Downtime Architecture
12.5. Cloud Balancing Architecture
12.6. Resource Reservation Architecture
12.7. Dynamic Failure Detection and Recovery Architecture
12.8. Bare-Metal Provisioning Architecture
12.9. Rapid Provisioning Architecture
12.10. Storage Workload Management Architecture
Chapter 13. Specialized Cloud Architectures
13.1. Direct I/O Access Architecture
13.2. Direct LUN Access Architecture
13.3. Dynamic Data Normalization Architecture
13.4. Elastic Network Capacity Architecture
13.5. Cross-Storage Device Vertical Tiering Architecture
13.6. Intra-Storage Device Vertical Data Tiering Architecture
13.7. Load Balanced Virtual Switches Architecture
13.8. Multipath Resource Access Architecture
13.9. Persistent Virtual Network Configuration Architecture
13.10. Redundant Physical Connection for Virtual Servers Architecture
13.11. Storage Maintenance Window Architecture
Part IV: Working with Clouds
Chapter 14. Cloud Delivery Model Considerations
14.1. Cloud Delivery Models: The Cloud Provider Perspective
14.2. Cloud Delivery Models: The Cloud Consumer Perspective
Chapter 15. Cost Metrics and Pricing Models
15.1. Business Cost Metrics
15.2. Cloud Usage Cost Metrics
15.3. Cost Management Considerations
Chapter 16. Service Quality Metrics and SLAs
16.1. Service Quality Metrics
16.3. SLA Guidelines
Part V: Appendices
Appendix A. Case Study Conclusions
A.1. ATN
A.2. DTGOV
A.3. Innovartus
Appendix B. Industry Standards Organizations
B.1. National Institute of Standards and Technology (NIST)
B.2. Cloud Security Alliance (CSA)
B.3. Distributed Management Task Force (DMTF)
B.4. Storage Networking Industry Association (SNIA)
B.5. Organization for the Advancement of Structured Information Standards (OASIS)
B.6. The Open Group
B.7. Open Cloud Consortium (OCC)
B.8. European Telecommunications Standards Institute (ETSI)
B.9. Telecommunications Industry Association (TIA)
B.10. Liberty Alliance
B.11. Open Grid Forum (OGF)
Appendix C. Mapping Mechanisms to Characteristics
Appendix D. Data Center Facilities (TIA-942)
D.1. Primary Rooms
D.2. Environmental Controls
D.3. Infrastructure Redundancy Summary
Appendix E. Cloud-Adapted Risk Management Framework
E.1. Security Conservation Principle
E.2. The Risk Management Framework
Appendix F. Cloud Provisioning Contracts
F.1. Cloud Provisioning Contract Structure
F.2. Cloud Provider Selection Guidelines
Appendix G. Cloud Business Case Template
G.1. Business Case Identification
G.2. Business Needs
G.3. Target Cloud Environment
G.4. Technical Issues
G.5. Economic Factors
About the Authors
Thomas Erl
Zaigham Mahmood
Ricardo Puttini
About the Contributors
Pamela J. Wise-Martinez, MSc
Gustavo Azzolin, BSc, MSc
Dr. Michaela Iorga, Ph.D.
Amin Naserpour
Vinícius Pacheco, MSc
Matthias Ziegler
Index
Inside Front Cover
Inside Back Cover
← Prev
Back
Next →
← Prev
Back
Next →