Cloud Computing Solutions. Группа авторов
Чтение книги онлайн.
Читать онлайн книгу Cloud Computing Solutions - Группа авторов страница 18
Storage resources: Methods are necessary for using and taking over files. Management methods that permit taking over the physical resources distributed and provisioned for information exchanges (network bandwidth, space, disk bandwidth, CPU) are very functional, and are an advanced reservation policy. For determining software and hardware characteristics, inquiry functions are required and an applicable load of data like bandwidth utilization and available storage is also needed for those reasons.
Network resources: Management methods that confer the authority of the resources which are assigned to network transfers (e.g., reservation, prioritization) might be fruitful. Inquiry functions are required for resolving network features and load.
Code repositories: This method for managing source and object coding is used by the specialized form of storage resource, e.g., a control system.
Catalogs: They are a particular type of repository that store resources and require a method for executing catalog query and update operations, e.g., a relational database.
1.3.3.2 Connectivity: Communicating Easily and Securely
Connectivity layer has validation and approval protocols which are required for grid specific network exchanges and furthermore characterizes center correspondence strategies. Correspondence protocols are required for the trading of information between texture layer assets. Correspondence necessities incorporate routing, transport and naming. Confirmation protocols are required for correspondence administrations for giving secure instruments to approve the validation of clients and assets. Connectivity layer gives validation administrations which have the accompanying qualities:
Single sign on: Clients must have the capacity to approve themselves (“sign on”) just once and after that they simply approach numerous grid assets depicted in texture layer.
Delegation: The user should have the ability to run a program for its own benefit, with the goal of finding out whether the program is fit to get the grid resources which the verified user is entitled to.
Integration with various local security solutions: All sites and resource suppliers ought to be incorporated with different nearby security arrangements. Grid security arrangements must have the capacity to consolidate with different nearby security arrangements and enable mapping to the local condition.
User-based trust relationships: In the event that the user has the privilege to utilize the artifacts from unmistakable locales or resource suppliers, the user ought to have the capability of using destinations together without requiring connection with the overseers of suppliers.
1.3.3.3 Resource: Sharing Single Resources
The resource layer lies above the connectivity layer correspondence and verification conventions to recognize conventions for the inception, checking, secure negotiation, accounting, control and payment of distributed operations of singular resources. Resource layer executes these conventions in the texture layer for controlling neighborhood resources. Two key classes of resource layer conventions could be striking:
Information protocol: These conventions are used in getting information of the structure and states of assets like the use governing policy, current load and its outline.
Management protocols: These protocols are used in negotiating access to shared physical resources, specifying resource requirements and monitoring tasks to be executed. A protocol might hold up monitoring the current state of an operation and while executing controlling operations.
1.3.3.4 Collective: Coordinating Multiple Resources
The following layers are engaged towards the protocols and services which are related along universal resource and cooperate with assembling of resources. This is the reason we called the following layer of the grid engineering the collective layer.
Directory services: Enables its clients to ask questions for artifacts by type, accessibility or load-sharing demand. Resource-level protocol is utilized in building indexes.
Scheduling, co-allocation and brokering service: This service enables members to ask for distribution of assignments of at least one physical resource for a specific reason and the scheduling of undertakings for appropriate resources.
Monitoring and diagnostic services: These specific applications screen asset designation, overload management, and additionally keep considerations regarding the assaults.
Data replication services: It supports the capacity management to expand the data received to execute and limit the reaction time and money.
Workload management systems: These systems deal with the utilization, depiction, status of the errand and multi-component work processes.
1.3.3.5 Application Layer
The end layer of grid framework is the application layer which interacts with the end users. According to the user applications, physical resources are provisioned and properly used by the applications.
Scientific and engineering: In the scientific and engineering fields, various application specific and user-specific requirements are entertained and physical and computing resources are provisioned accordingly.
Problem-solving statement: Application layer directly interacts with the problem-solving area. Application layer solves the problem module-wise.
Web-based apps: Application layer handles the Web-based apps and provides access to services like resource management, data access and so forth.
1.3.3.6 Comparison-Based Study of Cluster, Grid and Cloud Computing
Table 1.1 below describes a comparison-based study of cluster, grid and cloud.
Table 1.1: A comparison-based study of cluster, grid and cloud.
Characteristic | Clusters | Grids | Clouds |
Allocation | Centralized | Decentralized | Both |
Resource Handling
|