gogogo
Syndetics cover image
Image from Syndetics

Cloud computing : concepts, technology, & architecture / Thomas Erl, Zaigham Mahmood and Richardo Puttini.

By: Contributor(s): Material type: TextTextSeries: Prentice Hall service-oriented computing series from Thomas ErlPublication details: Upper Saddle River, NJ : Prentice Hall, [2013]Description: xxxiv, 489 pages : illustrations ; 24 cmISBN:
  • 0133387526
  • 9780133387520
Subject(s): DDC classification:
  • 004.67 ERL
Contents:
1. Introduction -- 2. Case study background -- pt. I. Fundamental cloud computing -- 3. Understanding cloud computing -- Origins and influences -- Basic concepts and terminology -- Goals and benefits -- Risks and challenges -- 4. Fundamental concepts and models -- Roles and boundaries -- Cloud characteristics -- Cloud delivery models -- Cloud deployment models -- 5. Cloud-enabling technology -- Broadband networks and internet architecture -- Data center technology -- Virtualization technology -- Web technology -- Multitenant technology -- Service technology -- 6. Fundamental cloud security -- Basic terms and concepts -- Threat agents -- Cloud security threats -- Additional considerations -- Flawed implementations -- Security policy disparity -- Contracts -- Risk management -- pt. II. Cloud computing mechanisms -- 7. Cloud infrastructure mechanisms -- Logical network perimeter -- Virtual server -- Cloud storage device -- Cloud usage monitor -- Resource replication -- Ready-made environment -- 8. Specialized cloud mechanisms -- Automated scaling listener -- Load balancer -- SLA monitor -- Pay-per-use monitor -- Audit monitor -- Failover system -- Hypervisor -- Resource cluster -- Multi-device broker -- State management database -- 9. Cloud management mechanisms -- Remote administration system -- Resource management system -- SLA management system -- Billing management system -- 10. Cloud security mechanisms -- Encryption -- Hashing -- Digital signature -- Public key infrastructure (PKI) -- Identity and access management (IAM) -- Single sign-on (SSO) -- Cloud-based security groups -- Hardened virtual server images -- pt. III. Cloud computing architecture -- 11. Fundamental cloud architectures -- Workload distribution -- Resource pooling -- Dynamic scalability -- elastic resource capacity -- Service load balancing -- Cloud bursting -- Elastic disk provisioning -- Redundant storage -- 12. Advanced cloud architectures -- Hypervisor clustering -- Load balanced virtual server instances -- Non-disruptive service relocation --Zero downtime -- Cloud balancing -- Resource reservation -- Dynamic failure detection and recovery -- Bare-metal provisioning -- Rapid provisioning -- Storage workload management -- 13. Specialized cloud architectures -- Direct I/O access -- Direct LUN access -- dynamic data normalization -- Elastic network capacity -- Cross-storage device vertical tiering -- Intra-storage device vertical data tiering -- Load balanced virtual switches -- Multipath resource access -- Persistent virtual network configuration -- Redundant physical connection for virtual servers -- Storage maintenance window -- pt. IV. Working with clouds -- 14. Cloud delivery model considerations -- Cloud delivery models : the cloud provider perspective -- Cloud delivery models : the cloud consumer perspective -- 15. Cost metrics and pricing models -- Business cost metrics -- Cloud usage cost metrics -- Cost management considerations -- 16. Service quality metrics and SLAs -- Service quality metrics -- Service availability -- Service reliability -- Service performance -- Service scalability -- Service resiliency -- SLA guidelines -- pt. V. Appendices -- A. Cast study conclusions -- ATN -- DTGOV -- Innovartus -- B. Industry standards organizations -- C. Mapping mechanisms to characteristics -- D. Data center facilities (TIA-942) -- Primary rooms -- Environmental controls -- Infrastructure redundancy summary -- E. Cloud-adapted risk management framework -- Security conservation principle -- The risk management framework -- F. Cloud provisioning contracts -- G. Cloud business case template.
Summary: Clouds are distributed technology platforms that leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services. In Cloud Computing: Concepts, Technology & Architecture, Thomas Erl, one of the world\'s top-selling IT authors, teams up with cloud computing experts and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, models, technology mechanisms, and technology architectures, all from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing platforms and solutions. Subsequent to technology-centric coverage, the book proceeds to establish business-centric models and metrics that allow for the financial assessment of cloud-based IT resources and their comparison to those hosted on traditional IT enterprise premises. Also provided are templates and formulas for calculating SLA-related quality-of-service values and numerous explorations of the SaaS, PaaS, and IaaS delivery models.--Jacket.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 004.67 ERL (Browse shelf(Opens below)) 1 Available 39002100533307
Standard Loan Thurles Library Main Collection 004.67 ERL (Browse shelf(Opens below)) 2 Available 39002100624064
Standard Loan Thurles Library Main Collection 004.67 ERL (Browse shelf(Opens below)) 3 Available 39002100624072

Enhanced descriptions from Syndetics:

Clouds are distributed technology platforms that leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services.

In Cloud Computing: Concepts, Technology & Architecture , Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing experts and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, models, technology mechanisms, and technology architectures, all from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing platforms and solutions.

Subsequent to technology-centric coverage, the book proceeds to establish business-centric models and metrics that allow for the financial assessment of cloud-based IT resources and their comparison to those hosted on traditional IT enterprise premises. Also provided are templates and formulas for calculating SLA-related quality-of-service values and numerous explorations of the SaaS, PaaS, and IaaS delivery models.

With more than 260 figures, 29 architectural models, and 20 mechanisms, this indispensable guide provides a comprehensive education of cloud computing essentials that will never leave your side.

Includes index.

1. Introduction -- 2. Case study background -- pt. I. Fundamental cloud computing -- 3. Understanding cloud computing -- Origins and influences -- Basic concepts and terminology -- Goals and benefits -- Risks and challenges -- 4. Fundamental concepts and models -- Roles and boundaries -- Cloud characteristics -- Cloud delivery models -- Cloud deployment models -- 5. Cloud-enabling technology -- Broadband networks and internet architecture -- Data center technology -- Virtualization technology -- Web technology -- Multitenant technology -- Service technology -- 6. Fundamental cloud security -- Basic terms and concepts -- Threat agents -- Cloud security threats -- Additional considerations -- Flawed implementations -- Security policy disparity -- Contracts -- Risk management -- pt. II. Cloud computing mechanisms -- 7. Cloud infrastructure mechanisms -- Logical network perimeter -- Virtual server -- Cloud storage device -- Cloud usage monitor -- Resource replication -- Ready-made environment -- 8. Specialized cloud mechanisms -- Automated scaling listener -- Load balancer -- SLA monitor -- Pay-per-use monitor -- Audit monitor -- Failover system -- Hypervisor -- Resource cluster -- Multi-device broker -- State management database -- 9. Cloud management mechanisms -- Remote administration system -- Resource management system -- SLA management system -- Billing management system -- 10. Cloud security mechanisms -- Encryption -- Hashing -- Digital signature -- Public key infrastructure (PKI) -- Identity and access management (IAM) -- Single sign-on (SSO) -- Cloud-based security groups -- Hardened virtual server images -- pt. III. Cloud computing architecture -- 11. Fundamental cloud architectures -- Workload distribution -- Resource pooling -- Dynamic scalability -- elastic resource capacity -- Service load balancing -- Cloud bursting -- Elastic disk provisioning -- Redundant storage -- 12. Advanced cloud architectures -- Hypervisor clustering -- Load balanced virtual server instances -- Non-disruptive service relocation --Zero downtime -- Cloud balancing -- Resource reservation -- Dynamic failure detection and recovery -- Bare-metal provisioning -- Rapid provisioning -- Storage workload management -- 13. Specialized cloud architectures -- Direct I/O access -- Direct LUN access -- dynamic data normalization -- Elastic network capacity -- Cross-storage device vertical tiering -- Intra-storage device vertical data tiering -- Load balanced virtual switches -- Multipath resource access -- Persistent virtual network configuration -- Redundant physical connection for virtual servers -- Storage maintenance window -- pt. IV. Working with clouds -- 14. Cloud delivery model considerations -- Cloud delivery models : the cloud provider perspective -- Cloud delivery models : the cloud consumer perspective -- 15. Cost metrics and pricing models -- Business cost metrics -- Cloud usage cost metrics -- Cost management considerations -- 16. Service quality metrics and SLAs -- Service quality metrics -- Service availability -- Service reliability -- Service performance -- Service scalability -- Service resiliency -- SLA guidelines -- pt. V. Appendices -- A. Cast study conclusions -- ATN -- DTGOV -- Innovartus -- B. Industry standards organizations -- C. Mapping mechanisms to characteristics -- D. Data center facilities (TIA-942) -- Primary rooms -- Environmental controls -- Infrastructure redundancy summary -- E. Cloud-adapted risk management framework -- Security conservation principle -- The risk management framework -- F. Cloud provisioning contracts -- G. Cloud business case template.

Clouds are distributed technology platforms that leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services. In Cloud Computing: Concepts, Technology & Architecture, Thomas Erl, one of the world\'s top-selling IT authors, teams up with cloud computing experts and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, models, technology mechanisms, and technology architectures, all from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing platforms and solutions. Subsequent to technology-centric coverage, the book proceeds to establish business-centric models and metrics that allow for the financial assessment of cloud-based IT resources and their comparison to those hosted on traditional IT enterprise premises. Also provided are templates and formulas for calculating SLA-related quality-of-service values and numerous explorations of the SaaS, PaaS, and IaaS delivery models.--Jacket.

Table of contents provided by Syndetics

  • Foreword (p. xxix)
  • Acknowledgments (p. xxxiii)
  • Chapter 1 Introduction (p. 1)
  • 1.1 Objectives of This Book (p. 3)
  • 1.2 What This Book Does Not Cover (p. 4)
  • 1.3 Who This Book Is For (p. 4)
  • 1.4 How This Book Is Organized (p. 4)
  • 1.5 Conventions (p. 9)
  • Symbols and Figures (p. 9)
  • Summary of Key Points (p. 9)
  • 1.6 Additional Information (p. 9)
  • Updates, Errata, and Resources (www.servicetechbooks.com) (p. 9)
  • Referenced Specifications (www.servicetechspecs.com) (p. 10)
  • The Service Technology Magazine (www.servicetechmag.com) (p. 10)
  • International Service Technology Symposium (www.servicetechsymposium.com) (p. 10)
  • What Is Cloud? (www.whatiscloud.com) (p. 10)
  • What Is REST? (www.whatisrest.com) (p. 10)
  • Cloud Computing Design Patterns (www.cloudpatterns.org) (p. 10)
  • Service-Orientation (www.serviceorientation.com) (p. 11)
  • CloudSchool.com Certified Cloud (CCP) Professional (www.cloudschool.com) (p. 11)
  • SOASchool.com SOA Certified (SOACP) Professional (www.soaschool.com) (p. 11)
  • Notification Service (p. 11)
  • Chapter 2 Case Study Background (p. 13)
  • 2.1 Case Study #1: ATN (p. 14)
  • Technical Infrastructure and Environment (p. 14)
  • Business Goals and New Strategy (p. 15)
  • Roadmap and Implementation Strategy (p. 15)
  • 2.2 Case Study #2: DTGOV (p. 16)
  • Technical Infrastructure and Environment (p. 17)
  • Business Goals and New Strategy (p. 18)
  • Roadmap and Implementation Strategy (p. 19)
  • 2.3 Case Study #3: Innovartus Technologies Inc (p. 20)
  • Technical Infrastructure and Environment (p. 20)
  • Business Goals and Strategy (p. 20)
  • Roadmap and Implementation Strategy (p. 21)
  • Part I Fundamental Cloud Computing
  • Chapter 3 Understanding Cloud Computing (p. 25)
  • 3.1 Origins and Influences (p. 26)
  • A Brief History (p. 26)
  • Definitions (p. 27)
  • Business Drivers (p. 28)
  • Capacity Planning (p. 28)
  • Cost Reduction (p. 29)
  • Organizational Agility (p. 30)
  • Technology Innovations (p. 30)
  • Clustering (p. 31)
  • Grid Computing (p. 31)
  • Virtualization (p. 32)
  • Technology Innovations vs. Enabling Technologies (p. 32)
  • 3.2 Basic Concepts and Terminology (p. 33)
  • Cloud (p. 33)
  • IT Resource (p. 34)
  • On-Premise (p. 36)
  • Cloud Consumers and Cloud Providers (p. 36)
  • Scaling (p. 37)
  • Horizontal Scaling (p. 37)
  • Vertical Scaling (p. 37)
  • Cloud Service (p. 38)
  • Cloud Service Consumer (p. 40)
  • 3.3 Goals and Benefits (p. 40)
  • Reduced Investments and Proportional Costs (p. 41)
  • Increased Scalability (p. 42)
  • Increased Availability and Reliability (p. 43)
  • 3.4 Risks and Challenges (p. 45)
  • Increased Security Vulnerabilities (p. 45)
  • Reduced Operational Governance Control (p. 45)
  • Limited Portability Between Cloud Providers (p. 47)
  • Multi-Regional Compliance and Legal Issues (p. 48)
  • Chapter 4 Fundamental Concepts and Models (p. 51)
  • 4.1 Roles and Boundaries (p. 52)
  • Cloud Provider (p. 52)
  • Cloud Consumer (p. 52)
  • Cloud Service Owner (p. 53)
  • Cloud Resource Administrator (p. 54)
  • Additional Roles (p. 56)
  • Organizational Boundary (p. 56)
  • Trust Boundary (p. 57)
  • 4.2 Cloud Characteristics (p. 58)
  • On-Demand Usage (p. 59)
  • Ubiquitous Access (p. 59)
  • Multitenancy (and Resource Pooling) (p. 59)
  • Elasticity (p. 61)
  • Measured Usage (p. 61)
  • Resiliency (p. 61)
  • 4.3 Cloud Delivery Models (p. 63)
  • Infrastructure-as-a-Service (IaaS) (p. 64)
  • Platform-as-a-Service (PaaS) (p. 65)
  • Software-as-a-Service (SaaS) (p. 66)
  • Comparing Cloud Delivery Models (p. 67)
  • Combining Cloud Delivery Models (p. 69)
  • IaaS + PaaS (p. 69)
  • IaaS + PaaS + SaaS (p. 72)
  • 4.4 Cloud Deployment Models (p. 73)
  • Public Clouds (p. 73)
  • Community Clouds (p. 74)
  • Private Clouds (p. 75)
  • Hybrid Clouds (p. 77)
  • Other Cloud Deployment Models (p. 78)
  • Chapter 5 Cloud-Enabling Technology (p. 79)
  • 5.1 Broadband Networks and Internet Architecture (p. 80)
  • Internet Service Providers (ISPs) (p. 80)
  • Connectionless Packet Switching (Datagram Networks) (p. 83)
  • Router-Based Interconnectivity (p. 83)
  • Physical Network (p. 84)
  • Transport Layer Protocol (p. 84)
  • Application Layer Protocol (p. 85)
  • Technical and Business Considerations (p. 85)
  • Connectivity Issues (p. 85)
  • Network Bandwidth and Latency Issues (p. 88)
  • Cloud Carrier and Cloud Provider Selection (p. 89)
  • 5.2 Data Center Technology (p. 90)
  • Virtualization (p. 90)
  • Standardization and Modularity (p. 90)
  • Automation (p. 91)
  • Remote Operation and Management (p. 92)
  • High Availability (p. 92)
  • Security-Aware Design, Operation, and Management (p. 92)
  • Facilities (p. 92)
  • Computing Hardware (p. 93)
  • Storage Hardware (p. 93)
  • Network Hardware (p. 95)
  • Carrier and External Networks Interconnection (p. 95)
  • Web-Tier Load Balancing and Acceleration (p. 95)
  • LAN Fabric (p. 95)
  • SAN Fabric (p. 95)
  • NAS Gateways (p. 95)
  • Other Considerations (p. 96)
  • 5.3 Virtualization Technology (p. 97)
  • Hardware Independence (p. 98)
  • Server Consolidation (p. 98)
  • Resource Replication (p. 98)
  • Operating System-Based Virtualization (p. 99)
  • Hardware-Based Virtualization (p. 101)
  • Virtualization Management (p. 102)
  • Other Considerations (p. 102)
  • 5.4 Web Technology (p. 103)
  • Basic Web Technology (p. 104)
  • Web Applications (p. 104)
  • 5.5 Multitenant Technology (p. 106)
  • 5.6 Service Technology (p. 108)
  • Web Services (p. 109)
  • REST Services (p. 110)
  • Service Agents (p. 111)
  • Service Middleware (p. 112)
  • 5.7 Case Study Example (p. 113)
  • Chapter 6 Fundamental Cloud Security (p. 117)
  • 6.1 Basic Terms and Concepts (p. 118)
  • Confidentiality (p. 118)
  • Integrity (p. 119)
  • Authenticity (p. 119)
  • Availability (p. 119)
  • Threat (p. 120)
  • Vulnerability (p. 120)
  • Risk (p. 120)
  • Security Controls (p. 120)
  • Security Mechanisms (p. 121)
  • Security Policies (p. 121)
  • 6.2 Threat Agents (p. 121)
  • Anonymous Attacker (p. 122)
  • Malicious Service Agent (p. 123)
  • Trusted Attacker (p. 123)
  • Malicious Insider (p. 123)
  • 6.3 Cloud Security Threats (p. 124)
  • Traffic Eavesdropping (p. 124)
  • Malicious Intermediary (p. 124)
  • Denial of Service (p. 126)
  • Insufficient Authorization (p. 127)
  • Virtualization Attack (p. 127)
  • Overlapping Trust Boundaries (p. 129)
  • 6.4 Additional Considerations (p. 131)
  • Flawed Implementations (p. 131)
  • Security Policy Disparity (p. 132)
  • Contracts (p. 132)
  • Risk Management (p. 133)
  • 6.5 Case Study Example (p. 135)
  • Part II Cloud Computing Mechanisms
  • Chapter 7 Cloud Infrastructure Mechanisms (p. 139)
  • 7.1 Logical Network Perimeter (p. 140)
  • Case Study Example (p. 142)
  • 7.2 Virtual Server (p. 144)
  • Case Study Example (p. 145)
  • 7.3 Cloud Storage Device (p. 149)
  • Cloud Storage Levels (p. 149)
  • Network Storage Interfaces (p. 150)
  • Object Storage Interfaces (p. 151)
  • Database Storage Interfaces (p. 151)
  • Relational Data Storage (p. 151)
  • Non-Relational Data Storage (p. 152)
  • Case Study Example (p. 152)
  • 7.4 Cloud Usage Monitor (p. 155)
  • Monitoring Agent (p. 155)
  • Resource Agent (p. 155)
  • Polling Agent (p. 157)
  • Case Study Example (p. 157)
  • 7.5 Resource Replication (p. 161)
  • Case Study Example (p. 162)
  • 7.6 Ready-Made Environment (p. 166)
  • Case Study Example (p. 167)
  • Chapter 8 Specialized Cloud Mechanisms (p. 169)
  • 8.1 Automated Scaling Listener (p. 170)
  • Case Study Example (p. 172)
  • 8.2 Load Balancer (p. 176)
  • Case Study Example (p. 177)
  • 8.3 SLA Monitor (p. 178)
  • Case Study Example (p. 180)
  • SLA Monitor Polling Agent (p. 180)
  • SLA Monitoring Agent (p. 180)
  • 8.4 Pay-Per-Use Monitor (p. 184)
  • Case Study Example (p. 187)
  • 8.5 Audit Monitor (p. 189)
  • Case Study Example (p. 189)
  • 8.6 Failover System (p. 191)
  • Active-Active (p. 191)
  • Active-Passive (p. 194)
  • Case Study Example (p. 196)
  • 8.7 Hypervisor (p. 200)
  • Case Study Example (p. 201)
  • 8.8 Resource Cluster (p. 203)
  • Case Study Example (p. 206)
  • 8.9 Multi-Device Broker (p. 208)
  • Case Study Example (p. 209)
  • 8.10 State Management Database (p. 210)
  • Case Study Example (p. 211)
  • Chapter 9 Cloud Management Mechanisms (p. 213)
  • 9.1 Remote Administration System (p. 214)
  • Case Study Example (p. 219)
  • 9.2 Resource Management System (p. 219)
  • Case Study Example (p. 221)
  • 9.3 SLA Management System (p. 222)
  • Case Study Example (p. 224)
  • 9.4 Billing Management System (p. 225)
  • Case Study Example (p. 227)
  • Chapter 10 Cloud Security Mechanisms (p. 229)
  • 10.1 Encryption (p. 230)
  • Symmetric Encryption (p. 231)
  • Asymmetric Encryption (p. 231)
  • Case Study Example (p. 233)
  • 10.2 Hashing (p. 234)
  • Case Study Example (p. 235)
  • 10.3 Digital Signature (p. 236)
  • Case Study Example (p. 238)
  • 10.4 Public Key Infrastructure (PKI) (p. 240)
  • Case Study Example (p. 242)
  • 10.5 Identity and Access Management (IAM) (p. 243)
  • Case Study Example (p. 244)
  • 10.6 Single Sign-On (SSO) (p. 244)
  • Case Study Example (p. 246)
  • 10.7 Cloud-Based Security Groups (p. 247)
  • Case Study Example (p. 249)
  • 10.8 Hardened Virtual Server Images (p. 251)
  • Case Study Example (p. 252)
  • Part III Cloud Computing Architecture
  • Chapter 11 Fundamental Cloud Architectures (p. 255)
  • 11.1 Workload Distribution Architecture (p. 256)
  • 11.2 Resource Pooling Architecture (p. 257)
  • 11.3 Dynamic Scalability Architecture (p. 262)
  • 11.4 Elastic Resource Capacity Architecture (p. 265)
  • 11.5 Service Load Balancing Architecture (p. 268)
  • 11.6 Cloud Bursting Architecture (p. 271)
  • 11.7 Elastic Disk Provisioning Architecture (p. 272)
  • 11.8 Redundant Storage Architecture (p. 275)
  • 11.9 Case Study Example (p. 277)
  • Chapter 12 Advanced Cloud Architectures (p. 281)
  • 12.1 Hypervisor Clustering Architecture (p. 282)
  • 12.2 Load Balanced Virtual Server Instances Architecture (p. 288)
  • 12.3 Non-Disruptive Service Relocation Architecture (p. 293)
  • 12.4 Zero Downtime Architecture (p. 298)
  • 12.5 Cloud Balancing Architecture (p. 299)
  • 12.6 Resource Reservation Architecture (p. 301)
  • 12.7 Dynamic Failure Detection and Recovery Architecture (p. 306)
  • 12.8 Bare-Metal Provisioning Architecture (p. 309)
  • 12.9 Rapid Provisioning Architecture (p. 312)
  • 12.10 Storage Workload Management Architecture (p. 315)
  • 12.11 Case Study Example (p. 321)
  • Chapter 13 Specialized Cloud Architectures (p. 323)
  • 13.1 Direct I/O Access Architecture (p. 324)
  • 13.2 Direct LUN Access Architecture (p. 326)
  • 13.3 Dynamic Data Normalization Architecture (p. 329)
  • 13.4 Elastic Network Capacity Architecture (p. 330)
  • 13.5 Cross-Storage Device Vertical Tiering Architecture (p. 332)
  • 13.6 Intra-Storage Device Vertical Data Tiering Architecture (p. 337)
  • 13.7 Load Balanced Virtual Switches Architecture (p. 340)
  • 13.8 Multipath Resource Access Architecture (p. 342)
  • 13.9 Persistent Virtual Network Configuration Architecture (p. 344)
  • 13.10 Redundant Physical Connection for Virtual Servers Architecture (p. 347)
  • 13.11 Storage Maintenance Window Architecture (p. 350)
  • Part IV Working With Clouds
  • Chapter 14 Cloud Delivery Model Considerations (p. 359)
  • 14.1 Cloud Delivery Models: The Cloud Provider Perspective (p. 360)
  • Building IaaS Environments (p. 360)
  • Data Centers (p. 361)
  • Scalability and Reliability (p. 363)
  • Monitoring (p. 363)
  • Security (p. 364)
  • Equipping PaaS Environments (p. 364)
  • Scalability and Reliability (p. 365)
  • Monitoring (p. 367)
  • Security (p. 367)
  • Optimizing SaaS Environments (p. 367)
  • Security (p. 370)
  • 14.2 Cloud Delivery Models: The Cloud Consumer Perspective (p. 370)
  • Working with IaaS Environments (p. 370)
  • IT Resource Provisioning Considerations (p. 372)
  • Working with PaaS Environments (p. 373)
  • IT Resource Provisioning Considerations (p. 373)
  • Working with SaaS Services (p. 374)
  • 14.3 Case Study Example (p. 375)
  • Chapter 15 Cost Metrics and Pricing Models (p. 379)
  • 15.1 Business Cost Metrics (p. 380)
  • Up-Front and On-Going Costs (p. 380)
  • Additional Costs (p. 381)
  • Case Study Example (p. 382)
  • Product Catalog Browser (p. 382)
  • On-Premise Up-Front Costs (p. 382)
  • On-Premise On-Going Costs (p. 383)
  • Cloud-Based Up-Front Costs (p. 383)
  • Cloud-Based On-Going Costs (p. 383)
  • Client Database (p. 385)
  • On-Premise Up-Front Costs (p. 385)
  • On-Premise On-Going Costs (p. 385)
  • Cloud-Based Up-Front Costs (p. 385)
  • Cloud-Based On-Going Costs (p. 385)
  • 15.2 Cloud Usage Cost Metrics (p. 387)
  • Network Usage (p. 387)
  • Inbound Network Usage Metric (p. 387)
  • Outbound Network Usage Metric (p. 388)
  • Intra-Cloud WAN Usage Metric (p. 388)
  • Server Usage (p. 389)
  • On-Demand Virtual Machine Instance Allocation Metric (p. 389)
  • Reserved Virtual Machine Instance Allocation Metric (p. 389)
  • Cloud Storage Device Usage (p. 390)
  • On-Demand Storage Space Allocation Metric (p. 390)
  • I/O Data Transferred Metric (p. 390)
  • Cloud Service Usage (p. 390)
  • Application Subscription Duration Metric (p. 390)
  • Number of Nominated Users Metric (p. 391)
  • Number of Transactions Users Metric
  • 15.3 Cost Management Considerations (p. 391)
  • Pricing Models (p. 393)
  • Additional Considerations (p. 395)
  • Case Study Example (p. 396)
  • Virtual Server On-Demand Instance Allocation (p. 397)
  • Virtual Server Reserved Instance Allocation (p. 399)
  • Cloud Storage Device (p. 401)
  • WAN Traffic (p. 401)
  • Chapter 16 Service Quality Metrics and SLAs (p. 403)
  • 16.1 Service Quality Metrics (p. 404)
  • Service Availability Metrics (p. 405)
  • Availability Rate Metric (p. 405)
  • Outage Duration Metric (p. 406)
  • Service Reliability Metrics (p. 407)
  • Mean-Time Between Failures (MTBF) Metric (p. 407)
  • Reliability Rate Metric (p. 407)
  • Service Performance Metrics (p. 407)
  • Network Capacity Metric (p. 408)
  • Storage Device Capacity Metric (p. 408)
  • Server Capacity Metric (p. 408)
  • Web Application Capacity Metric (p. 408)
  • Instance Starting Time Metric (p. 409)
  • Response Time Metric (p. 409)
  • Completion Time Metric (p. 409)
  • Service Scalability Metrics (p. 409)
  • Storage Scalability (Horizontal) Metric (p. 410)
  • Server Scalability (Horizontal) Metric (p. 410)
  • Server Scalability (Vertical) Metric (p. 410)
  • Service Resiliency Metrics (p. 411)
  • Mean-Time to Switchover (MTSO) Metric (p. 411)
  • Mean-Time System Recovery (MTSR) Metric (p. 412)
  • 16.2 Case Study Example (p. 412)
  • 16.3 SLA Guidelines (p. 413)
  • 16.4 Case Study Example (p. 416)
  • Scope and Applicability (p. 416)
  • Service Quality Guarantees (p. 416)
  • Definitions (p. 417)
  • Usage of Financial Credits (p. 417)
  • SLA Exclusions (p. 418)
  • Part V Appendices
  • Appendix A Case Study Conclusions (p. 421)
  • A.1 ATN (p. 422)
  • A.2 DTGOV (p. 422)
  • A.3 Innovartus (p. 424)
  • Appendix B Industry Standards Organizations (p. 427)
  • B.1 National Institute of Standards and Technology (NIST) (p. 428)
  • B.2 Cloud Security Alliance (CSA) (p. 429)
  • B.3 Distributed Management Task Force (DMTF) (p. 429)
  • B.4 Storage Networking Industry Association (SNIA) (p. 430)
  • B.5 Organization for the Advancement of Structured Information Standards (OASIS) (p. 430)
  • B.6 The Open Group (p. 430)
  • B.7 Open Cloud Consortium (OCC) (p. 431)
  • B.8 European Telecommunications Standards Institute (ETSI) (p. 431)
  • B.9 Telecommunications Industry Association (TIA) (p. 431)
  • B.10 Liberty Alliance (p. 432)
  • B.11 Open Grid Forum (OGF) (p. 432)
  • Appendix C Mapping Mechanisms to Characteristics (p. 433)
  • Appendix D Data Center Facilities (TIA-942) (p. 437)
  • D.1 Primary Rooms (p. 438)
  • Electrical Room (p. 438)
  • Mechanical Room (p. 438)
  • Storage and Staging (p. 438)
  • Offices, Operations Center, and Support (p. 438)
  • Telecommunications Entrance (p. 438)
  • Computer Room (p. 439)
  • D.2 Environmental Controls (p. 440)
  • External Electrical Power Provider Interconnection (p. 440)
  • Power Distribution (p. 441)
  • Uninterruptible Power Source (UPS) (p. 441)
  • Power Engine-Generator (p. 441)
  • D.3 Infrastructure Redundancy Summary (p. 442)
  • Appendix E Emerging Technologies (p. 443)
  • E.1 Autonomic Computing (p. 444)
  • E.2 Grid Computing (p. 445)
  • Service Grids (p. 446)
  • Appendix F Cloud Provisioning Contracts (p. 449)
  • F.1 Cloud Provisioning Contract Structure (p. 450)
  • Terms of Service (p. 452)
  • Service Usage Policy (p. 452)
  • Security and Privacy Policy (p. 453)
  • Warranties and Liabilities (p. 455)
  • Rights and Responsibilities (p. 455)
  • Termination and Renewal (p. 456)
  • Specifications and SLAs (p. 456)
  • Pricing and Billing (p. 457)
  • Other Issues (p. 457)
  • Legal and Compliance Issues (p. 457)
  • Auditability and Accountability (p. 457)
  • Changes in the Contract Terms and Conditions (p. 457)
  • F.2 Cloud Provider Selection Guidelines (p. 458)
  • Cloud Provider Viability (p. 458)
  • Appendix G Cloud Business Case Template (p. 461)
  • G.1 Business Case Identification (p. 462)
  • G.2 Business Needs (p. 462)
  • G.3 Target Cloud Environment (p. 463)
  • G.4 Technical Issues (p. 464)
  • G.5 Economic Factors (p. 464)
  • About the Authors (p. 465)
  • About the Foreword Contributor (p. 467)
  • About the Contributors (p. 469)
  • Index (p. 471)

Author notes provided by Syndetics

Thomas Erl is a top-selling IT author, founder of Arcitura Education, editor of the Service Technology Magazine and series editor of the Prentice Hall Service Technology Series from Thomas Erl . With more than 175,000 copies in print world-wide, his books have become international bestsellers and have been formally endorsed by senior members of major IT organizations, such as IBM, Microsoft, Oracle, Intel, Accenture, IEEE, HL7, MITRE, SAP, CISCO, HP, and many others. As CEO of Arcitura Education Inc. and in cooperation with CloudSchool.com and SOASchool.com, Thomas has led the development of curricula for the internationally recognized Cloud Certified Professional (CCP) and SOA Certified Professional (SOACP) accreditation programs, which have established a series of formal, vendor-neutral industry certifications obtained by thousands of IT professionals around the world. Thomas has toured over 20 countries as a speaker and instructor and regularly participates in international conferences, including Service Technology Symposium and Gartner events. More than 100 articles and interviews by Thomas have been published in numerous publications, including The Wall Street Journal and CIO Magazine .


Dr. Zaigham Mahmood is a published author of six books, four of which are dedicated to cloud computing. He acts as a technology consultant at Debesis Education UK and a Researcher at the University of Derby, UK. He further holds positions as a foreign professor and professor extraordinaire with international educational institutions. Professor Mahmood is a certified cloud trainer and a regular speaker at the International SOA, Cloud + Service Technology Symposium, and he has published more than 100 articles. His specialized areas of research include distributed computing, project management, and e-government.


Professor Ricardo Puttini has 15 years of field experience as a senior IT consultant at major government organizations in Brazil. He has taught several undergraduate and graduate-level courses in service orientation, service-oriented architecture, and cloud computing. Ricardo was the general chair of the 4th International SOA Symposium and 3rd International Cloud Symposium that was held in the spring of 2011. He holds a Ph.D. in Communication Networks (2004) from the University of Brasilia, where he has taught in the Electrical Engineering department since 1998. Ricardo spent 18 months at the L′Ecole Superieure d′Electricite (Supelec) in Rennes, France, during his Ph.D., where he started researching distributed system architecture and security.

Powered by Koha