Cloud Computing Basics PDF

Summary

This document provides an overview of cloud computing basics, highlighting the transition from the traditional IT architecture to cloud-based solutions. It explains the background, challenges, and benefits of cloud computing. It also defines cloud computing and its characteristics.

Full Transcript

IT2314 Cloud Computing Basics Enterprises in the fast-growing ICT industry are posing higher requirements on compute, storage, and networking resources. Within this context, cloud computing, ha...

IT2314 Cloud Computing Basics Enterprises in the fast-growing ICT industry are posing higher requirements on compute, storage, and networking resources. Within this context, cloud computing, has emerged to meet the need for on-demand resources and accelerate business innovation. Background of Cloud Computing With the prevalence of the mobile Internet and a fully connected era, more terminal devices are being used and data is exploding every day, posing unprecedented challenges to conventional ICT. The PC era is essentially in which computers are networked, and personal computers are connected through servers. Now, in the mobile era, we can assess the Internet through mobile phones. With the advent of 5G, all computers, mobile phones, and intelligent terminals can be connected, and we can enter an era of Internet of Everything (IoE). In the IoE era, the entire industry will compete for ecosystem. From the PC era to the mobile era, and to the IoE era, the ecosystem experiences fast changes at the beginning, then tends to be relatively stable, and rarely changes when it is stable. In the PC era, a large number of applications run on Windows, Intel chips, and x86 architecture. Then, browsers come with the Internet. In the mobile era, applications run on iOS and Android systems that use the ARM architecture. Compared with the previous generation, the number of devices and the market scale of each generation increase greatly, presenting a future opportunity. As Intel and Microsoft in the PC era and ARM and Google in the mobile era, each Internet generation has its leading enterprises which master the industry chain. In the future, those who have a good command of core chips and operating systems will dominate the industry. Challenges Faced by Conventional IT Architecture: The Internet brings a large amount of traffic, users, and data, so enterprises need to continually purchase traditional IT devices to keep pace with their rapid development. Therefore, the disadvantages of traditional IT devices gradually emerge. Long procurement period causes slow rollout of new business systems. The centralized architecture has poor scalability and can only increase the processing performance of a single node. Traditional hardware devices exist independently, and their reliability depends only on software. Devices and vendors are heterogeneous and hard to manage. The performance of a single device is limited. The utilization of devices is low, while the total cost remains high. Enterprises Are Migrating to the Cloud Architecture 01 Handout 1 *Property of STI  [email protected] Page 1 of 5 IT2314 The traditional IT architecture consists of hardware and software, including infrastructure, data centers, servers, network hardware, desktop computers, and enterprise application software solutions. This architecture requires more power, physical space, and capital, and is usually installed locally for enterprises or private use. With virtualization technology, computer components run on the virtualization environment, not on the physical environment. Virtualization enables maximum utilization of the physical hardware and simplifies software reconfiguration. With cloud transformation, enterprise data centers are transformed from resource silos to resource pooling, from centralized architecture to distributed architecture, from dedicated hardware to software-defined storage (SDS) mode, from manual handling to self-service and automatic service, and from distributed statistics to unified metering. Definition of Cloud Computing Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction (National Institute of Standards and Technology (NIST)). Simply put, the term “cloud” is a metaphor for networks and the Internet, and refers to an abstraction of the Internet and the infrastructure that underpins it. Computing refers to computing services provided by a powerful computer with a range of functionalities, resources, and storage. As such, cloud computing can be viewed as the delivery of on-demand, measured computing services over the Internet. Cloud computing has the following characteristics: Broad network access Fast and elastic scaling On-demand self-service Resource pooling Metered services Cloud Computing Is Around Us The following are data sources of cloud computing in daily life. These apps are based on cloud computing, making our lives more convenient. Cloud computing allows enterprises to provide better products to attract more users. Cloud album, such as Baidu Cloud and iCloud Shared Album Cloud music, such as NetEase Cloud Music, Kugou Music, Kuwo Music, and Xiami Music Cloud video, such as Baidu Cloud and Tencent Cloud Video Cloud documents, such as Youdao Note, and Shimo document Cloud Services and Applications Around Us (Enterprises) HUAWEI CLOUD Meeting allows interactive video and voice communications between people in two or more locations. Driven by the requirements of the government, transportation, electric power, medical care, education, finance, and military industries and enterprises, the video conferencing market in China has an average annual growth beyond 20%. Currently, only less than 5% of enterprises in China have video conference rooms, and more and more enterprises are aware of the importance 01 Handout 1 *Property of STI  [email protected] Page 2 of 5 IT2314 of efficient collaboration. Therefore, the video conferencing system has become indispensable for efficient office work. HUAWEI CLOUD Meeting can be used by enterprise offices, telemedicine, smart education, and enterprise organization construction. E-Gov Cloud Online Services: The e-Government cloud enables access to comprehensive public services through the Internet and serves as an extensive service platform with software, application, and information resources provisioned for governmental bodies. It utilizes the compute, storage, network, security, and application resources in existing equipment rooms and leverages cloud computing to offer high reliability, availability, and elasticity. Online services are the most typical application of e-Gov and are used in multiple cities. With online services, applicants fill in the application information and submit supporting documents. The administrative approval center approves applications by streamlining cross-department data. By moving services to the cloud, governments can greatly reduce expenditure, cloud service providers can gain new development benefits, and citizens can acquire services more and more conveniently. Guidance: All policies, bulletins, and processes are released through information guidance, making service handling processes clear for citizens and enterprises. Intelligent Process Automation (IPA) robots are provided to guide users. Handling: Based on big data and AI technologies, fields in documents can be auto-populated. Review: AI technologies pre-review documents, improve review efficiency and quality, and reduce pressure on staff. Real-Time Communication (RTC) audio and video technologies can implement contactless online pre-review. Collaboration: RPA technology handles all work items through the workbench, effectively collaborating with functional agencies. All application and service entries can be managed in a unified manner. Public cloud is the main form of cloud computing, which is developing considerably in China. Public cloud vendors can be classified as follows: Traditional telecom infrastructure carriers, including China Mobile, China Unicom, and China Telecom Local government cloud computing platforms Public cloud platforms built by Internet giants, such as Alibaba Cloud and Tencent Cloud Some IDC carriers, such as 21Vianet Group Enterprises with foreign technical background or introducing foreign cloud computing technologies, such as Fengqi.Asian Cloud Cloud Computing Models Deployment Models for Cloud Computing Private cloud is a cloud infrastructure operated solely for a single organization. All data of the private cloud is kept within the organization's data center. Attempts to access such data will be controlled by ingress firewalls deployed for the data center, offering maximum data protection. Public cloud service provider owns and operates the cloud infrastructure and provides cloud services open to the public or enterprise customers. This model gives users access to convenient, on-demand IT services, comparable to how they would access utilities like water and electricity. 01 Handout 1 *Property of STI  [email protected] Page 3 of 5 IT2314 A hybrid cloud is a combination of a public cloud and a private cloud or on-premises resources, that remain distinct entities but are bound together, offering the benefits of multiple deployment models. Users can migrate workloads across these cloud environments as needed. Service Model for Cloud Computing Infrastructure as a Service (IaaS): The cloud platform provides infrastructure (such as servers, storage devices, networks, and virtual resources) and maintains related resources. Users only need to pay attention to the system and application layers. Platform as a Service (PaaS): The cloud platform provides infrastructure (such as servers, storage devices, networks, and virtual resources) and application deployment environment (such as the operating system, middleware, and software running environment) and maintains related resources. Users only need to focus on applications and data. Software as a Service (SaaS): The cloud platform provides all resources, services, and maintenance. Users only need to use applications. Compared with the conventional IT entire-process and all-device procurement mode, the cloud service-oriented mode provides IT devices as services that allow customers to select on demand, which has more advantages in flexibility, and low cost. Benefits of Cloud Computing Cloud computing integrates hardware resources into one in software, and dynamically allocates the resources to applications in software, which greatly improves resource usage. Cloud computing also supports auto scaling, and optimizes work efficiency. By building high-specification cloud data centers and introducing automatic scheduling technology, data storage is more centralized, and data assets are more effectively used, achieving energy saving, emission reduction, and easier maintenance. In this way, lower costs and higher efficiency are achieved in each dimension. Cloud computing has five (5) main benefits: On-demand self-service: Customers can deploy processing services based on actual requirements on the server running time, network, and storage, and do not need to communicate with each service provider. Broad network access: Various capabilities can be obtained over the Internet, and the Internet can be accessed in standard mode from various clients, such as mobile phones, laptops, and PADs. 01 Handout 1 *Property of STI  [email protected] Page 4 of 5 IT2314 Resource pooling: Computing resources of the service provider are centralized so that customers can rent services. In addition, different physical and virtual resources can be dynamically allocated and reallocated based on customer requirements. Customers generally cannot control or know the exact location of the resources. The resources include storage devices, processors, memory, network bandwidth, and virtual machines. Quick deployment and auto scaling: Cloud computing can rapidly and elastically provide computing capabilities. A customer can rent unlimited resources and purchase required resources at any time. Metered services: Cloud services are billed based on the actual resource usage, such as the CPU, memory, storage capacity, and bandwidth consumption of cloud servers. Cloud services provide two billing modes: pay-per-use and yearly/monthly. Eight Common Characteristics of Cloud Computing Massive scale: Cloud computing service is on a large scale as it centralizes IT resource supply. This makes cloud computing different from conventional IT. Homogeneity: Homogeneity can also be understood as standardization, which is similar to power utilization. The voltage and socket interface should be the same for various electrical appliances and devices. Virtualization: Virtualization has two meanings. One is accurate computing units. If a cake is too large for one person, it is better to divide it into small pieces to share. That is, with smaller computing units, IT resources can be fully used. The other meaning is the separation of software and hardware. Before virtualization, software and specified hardware are bound together, and after virtualization, software can be freely migrated on all hardware, which is like renting a house instead of buying one. Elastic computing: Elastic computing means that IT resources can be elastically provided. Low-cost software: Low-cost software is provided to meet the market competition and requirements. Cloud computing, with low individual technical skill and financial requirements, makes IT easy to use. Small and micro startups are always willing to enjoy more IT services at the lowest cost. Based on this situation, low-cost software is required to earn money at small profits but quick turnover. Geographic distribution: As the broad access mentioned above, IT services can be provided anytime and anywhere. From the perspective of users, cloud computing data centers are geographically distributed and the performance of network bandwidth varies by region. Large public cloud service providers have dozens or even hundreds of data centers or service nodes to provide cloud computing services to global customers. Service orientation: Cloud computing is a service model, and the overall design is service-oriented. Advanced security technology: Public cloud has a large number of users with different requirements. Therefore, advanced security technologies must be adopted to protect cloud computing. 01 Handout 1 *Property of STI  [email protected] Page 5 of 5 IT2314 Cloud Computing Technologies Compute services provide the computing power required for running services such as websites, office software, and data analysis. Currently, typical compute cloud services are VMs and containers. Network services provide resource connectivity and isolation, such as data center networks and campus networks. On the cloud, VMs use virtual networks (for example, VPC) that have a logical topology similar to that of traditional networks. Storage services include: Block storage: features high performance and low latency, meeting different high I/O service requirements. File storage: allows file sharing among multiple servers or enterprise departments. Object storage: features a flat, easy scale-out architecture, which is suitable for cloud storage. It is mainly used for massive data storage, cold data backup, and software repository. Compute What is Virtualization? The virtualization technology refers to the process of creating multiple VMs that share the hardware resources of a physical server. A VM consists of disk files and description files, which are encapsulated in the same folder. Multiple VMs running on the server are separately encapsulated in multiple folders and mutually isolated. These folders can be stored in the file system provided by the underlying storage. Therefore, multiple VMs can be stored or run on a shared medium. In computer technologies, virtualization is a resource management technology. It abstracts various physical resources of a computer, such as CPU, memory, disk space, and network adapters, converts the resources, and presents the resources for segmentation and combination into one or more computer configuration environments. In this way, the uncut barriers between physical structures are broken, allowing users to use computer hardware resources in a better way than the original configuration. As shown in the figure, a physical server is divided into multiple files through virtualization, and each file represents a VM. 02 Handout 1 *Property of STI  [email protected] Page 1 of 11 IT2314 Virtualization vs. Cloud Computing Virtualization is the fundamental technology that powers cloud computing. It transforms physical hardware into virtual resources. On the other hand, the cloud is an environment that delivers virtualized resources on-demand through the Internet. Virtualization is a key technology of cloud computing. It aims to abstract physical resources into logical resources for flexible allocation. Virtualization offers scalable, distributed, and HA resources for cloud computing. Cloud computing allows users to use cloud resources on demand, relying on the virtualization technology. Main Features of Virtualization Partitioning: Multiple VMs can run on one physical server, which means that the virtualization layer can allocate the resources of a physical server to multiple VMs. This is called partitioning. Isolation: If one VM on a server is faulty or infected with viruses, the other VMs can still run properly. Encapsulation: VMs exist in the virtualization system as files. You can migrate VMs by cutting/copying and pasting files. Independence: After being migrated to another physical server, a VM can properly run without any modification on the server because VM OSs are decoupled from physical hardware. Important Virtualization Concepts Hypervisor: It is also called virtualization software or VM monitor. Hypervisor is used to create and run VMs on physical servers. The mainstream open-source virtualization technologies are Xen and KVM. Guest OS: Virtual machine (VM) OS Guest Machine: VM Hypervisor: Virtualization software layer/Virtual machine monitor (VMM) Host OS: OS running on a physical machine Host machine: Physical machine Computing Resources Around Us Computing essentially refers to the process of obtaining information. In the ICT industry, several resources are needed to calculate data and obtain information. A computer system consists of a CPU, memory, disk, and network resources. Compute resources include CPU, GPU, and memory. Central Processing Unit (CPU) is the computing and control core of a computer system, which processes information and executes programs. Memory is an important component of a computer system. It is used to store CPU computing data and exchange data between memory and external storage (such as hard disks). 02 Handout 1 *Property of STI  [email protected] Page 2 of 11 IT2314 Graphics Processing Unit (GPU) is a microprocessor that performs image computation on PCs, workstations, game consoles, and mobile terminal devices such as tablets and smartphones. HUAWEI CLOUD Compute Services An Elastic Cloud Server (ECS) is a VM on the cloud consisting of vCPUs, memory, OS, and EVS disks. After buying an ECS, you can use it on the cloud just like you would use your local PC or physical server. Auto Scaling (AS) automatically scales compute resources based on your demands and the AS policies you have configured, properly adjusting the number of ECSs as the service load changes over time. An image is a template used to create servers or disks. Image Management Service (IMS) provides image lifecycle management. With the IMS, you can create a system or data disk image from a server or an external image file. You can also create a full ECS image from an ECS or a backup of an ECS. What is a Container? A container is a lightweight, portable technology for application packaging. It is a standard unit that packages an application's code and all its dependencies, enabling the application to run across different computing environments. Simply put, containers are like standardized boxes that can hold different types of things and be put into different cabinets. Containers can: Package software into standardized units for development, migration, and deployment. Isolate compute, storage, network, and other resources. Start, stop, deploy, and migrate applications agilely and instantly. Allow developers to focus on R&D and O&M engineers to focus on system maintenance. Container Technology Development Two challenges in the development of container technology: Unified platform Usability Container technology was born in 1979 and introduced as the chroot operation in UNIX. Chroot provided an isolated file system for each progress so their root directories can be easily changed. This is the origin of OS virtualization. In 2000, BSD released FreeBSD Jails based on chroot. In addition to file system isolation, FreeBSD Jails isolate users, networks, and other resources. An IP address was assigned to each jail, which is an independent, smaller computer system, for independent software installation and configuration. 02 Handout 1 *Property of STI  [email protected] Page 3 of 11 IT2314 In 2005, SWsoft released OpenVZ, which was similar to Solaris Containers. OpenVZ uses a modified Linux kernel to provide virtualization, isolation, resource management, and checkpoints. Since then, kernel virtualization has become a mainstream solution. In 2006, Google launched Process Containers. Process Containers, renamed as control groups (cgroups) later, were designed for limiting, accounting, and isolating resource usage (CPU, memory, disk I/O, network) of a collection of processes. In 2007, cgroups were merged into Linux kernel 2.6.24. In 2008, LXC (the first, most complete implementation of Linux container manager) was implemented using cgroups and Linux namespaces. LXC can work on a single vanilla Linux kernel without requiring any patches. In 2013, Docker was launched. It was initially an internal project of dotCloud, a PaaS company. Just as Warden did, Docker used LXC in its initial stages and later replaced LXC with its own libcontainer. Docker separated itself from the pack by offering an entire ecosystem for container management, including Open Container Initiative, Container Registry, REST API, CLI, and Docker Swarm. In 2014, CoreOS introduced the container engine rkt as an alternative to Docker to improve container security. Containers tools related to rkt include the service discovery tool etcd, the networking tool flannel, etc. In 2016, Microsoft launched Hyper-V containers in Windows Server. Hyper-V containers are similar to Linux containers and provide isolation for each container so processes in a container are isolated from the outside. It features both the security of VMs and the lightweight of containers. Difference Between Containers and VMs Containers and VMs have similar advantages in resource isolation and allocation but different functions because containers virtualize OSs instead of hardware. Containers are more portable and efficient. There is no virtualization layer in the container architecture. Therefore, containerization is called lightweight virtualization. Applications running in containers have better performance than those in VMs. Containers have become popular because of many benefits, including: Agile building and deployment of applications: The creation of container images is easier and more efficient than that of VM images. 02 Handout 1 *Property of STI  [email protected] Page 4 of 11 IT2314 Consistent development, integration, and deployment: Containers can be quickly restored using images. You can customize new images for consistent container building and deployment. Portability across clouds and OSs: Containers can run on Ubuntu, RHEL, CoreOS, Google Kubernetes Engine, physical servers, etc. Application-centered management: The abstraction is improved from virtualizing hardware for OS isolation to virtualizing an OS for application isolation. Loosely coupled, distributed, elastic, independent microservices: Applications are divided into independent, small units and can be deployed and managed separately instead of running on a single large server. Isolated resources: Application performance can be predicted. High resource utilization: Resources can be fully used. Containers are an abstraction at the application layer. A container packages up code and its dependencies required for the proper running of an application. Multiple containers can run on the same server with a shared OS kernel. Each container runs as an independent process in the user space. Containers take up less space than VMs, process more applications, and require less CPU and memory. Virtual Machines (VMs) are an abstraction of physical hardware and turn one server into multiple servers. The hypervisor allows multiple VMs to run on the same physical server. Each VM has its own OS, applications, necessary binaries, and libraries, taking up tens of GB. The startup speed of a VM may be slow. Container image: A container image is dedicated to running a specific service and usually contains only the resources required for running the service. Many widely used images are tens of MB or less in size. VM image: A VM image offers the operating environment (including the OS kernel) required by common processes and provides a complete collection of functions. The minimum size of a VM image is hundreds of MB. 02 Handout 1 *Property of STI  [email protected] Page 5 of 11 IT2314 HUAWEI CLOUD Container Services Cloud Container Engine (CCE) is a high-performance, high-reliability service through which enterprises can manage containerized applications. CCE supports native Kubernetes applications and tools, allowing users to easily set up a container runtime environment on the cloud. CCE Turbo clusters run on the cloud native 2.0 infrastructure, accelerating compute, network, and scheduling. Cloud Container Instance (CCI) is a serverless container engine that allows users to run containers without creating or managing server clusters. SoftWare Repository for Container (SWR) allows users to easily manage the full lifecycle of container images and facilitates secure deployment of images for your applications. Users can upload, download, and manage container images through SWR Console, community CLI, or SWR APIs. SWR can either work with CCE and CCI or be used as an independent container image repository. Network Networks bridge devices and VMs and allow them to communicate with each other. Therefore, networks are essential for ICT infrastructure. Basic Concepts of Conventional Networks Broadcast and unicast: The communication between two devices is like that between people. The unicast, like one person talking to another, refers to the information that is sent and received between two nodes. The broadcast, like one person using a loudspeaker to talk to many people, has higher communication efficiency and ensures that the information can be sent to all related devices. Router: A router is a hardware device that connects two or more networks. It works as a gateway to read the address of each data packet and decide how to forward it. Default gateway: To understand the default gateway, we need to know what a gateway is. A gateway is a device that connects a subnet to an external network. When a device sends information to a host, a subnet mask determines whether the destination host is on the local subnet according to the destination address. If the host is on the local subnet, the device can directly send information to the host. If not, the device will first send the information to the default gateway or router, which then forwards the information to other networks to reach the host. Virtual Local Area Network (VLAN): VLAN is a group of logical devices and users, which are organized based on functions, departments, and applications, regardless of their physical locations. Such devices and users communicate with each other as if they are on the same network segment. VLANs can be used to isolate different services. What Does a Router Do? Our PCs can access the Internet through a router. Likewise, servers can be connected to the Internet by using a router. A router is a gateway device that operates on the third layer of the OSI Model, the network layer. It stores and forwards packets between different networks and routes data from one subnet to another. In network communications, routers can determine network addresses and select IP 02 Handout 1 *Property of STI  [email protected] Page 6 of 11 IT2314 routes. Routers can flexibly set up connections for networks and send packets between them through different media access control mechanisms. Routers accept information only from the source and other related routers, functioning as interconnection devices on the network layer. What Does a Layer 2 Switch Do? A network switch is used to forward electrical signals, and establishes an exclusive electrical signal route for any two nodes connected to the switch. Ethernet switches are most commonly used. Other common switches include telephone voice switches and fiber switches. Switching allows devices to automatically or allows you to manually send information to an appropriate route, meeting the requirements of both communications ends. A switch has multiple ports, with each port providing the bridging function. A port can be connected to a local area network (LAN) or a high-performance server or workstation. On a conventional network, Layer 2 switches use VLANs to isolate network planes. What Does a Layer 3 Switch Do? For safety and management purposes, a large local area network (LAN) must be divided into several small LANs to reduce the impact of broadcast storms, so the virtual local area network (VLAN) technology is widely used. Communications between different VLANs are forwarded by routers. With the increase of access across networks, if only routers are used, the network scale and access speed are restricted because there is a limited port quantity and the routing speed is slow. To address this, Layer 3 switches are developed. Layer 3 switches are designed for IP addresses. These switches provide simple APIs and are strong in processing Layer 2 packets, suitable for routing and switching data in large LANs. Layer 3 switches not only replace or partially complete the function of traditional routers in the third layer of the network model but also have almost the same switching speed as the second layer. And the price of Layer 3 switches is cheaper. What Does a NIC Do? NICs are mainly used to connect different devices. Like a telephone card, they ensure devices can communicate. In addition, NICs can be bound to deliver higher reliability and better network performance. The onboard NIC provides network expansion capabilities. It transmits data from servers to other devices, providing application services externally. Commonly supported NIC speed rates include 100 Mbit/s, 1 Gbit/s, and 10 Gbit/s. Basic Concepts of Virtual Networks Why is a virtual network required? VMs hosted on a physical machine may be in different IP address ranges, so these IP address ranges need to be isolated. In addition, VMs need to share the same physical NIC to access external networks. Therefore, virtual switches are used on servers to construct virtual networks. In network virtualization, the first problem to be solved is how to map the virtual NICs of the VMs to the physical NICs of the physical server where the VMs are hosted. As shown in the figure, we can use network bridges, NAT and virtual switches to solve this problem. 02 Handout 1 *Property of STI  [email protected] Page 7 of 11 IT2314 What Do Bridge and NAT Do? Both a bridge and NAT can forward the traffic of different VMs to physical NICs so that data packets can be routed from the server to the physical switch, implementing the communication between VMs and between VMs and external networks. Virtual switches also have the bridging function. A virtual switch has a table that defines mapping between MAC addresses and ports to isolate collision domains. Simply speaking, a bridge connects different physical LANs at the data link layer. NAT forwards the traffic to external networks through translating network addresses. NAT not only avoids the lack of IP addresses, but also protects computers on the private network from being attacked by other networks. What Does a Virtual Switch Do? Like the bridge and NAT, virtual switches are used to transmit the internal traffic of VMs to the external network through the network port of the physical server where the VMs reside. The common virtual switch models include OVS and EVS. Open vSwitch (OVS): An OVS is a software-based open-source virtual switch. It supports multiple standards and protocols with additional support for the OpenFlow protocol, and can be integrated with multiple open-source virtualization platforms. An OVS can be used to transmit traffic between VMs and implement communication between VMs and external networks. Enhanced vSwitch (EVS): An EVS is an enhanced OpenFlow-compliant virtual switch that improves the I/O performance based on the OVS forwarding technology. I/O performance is significantly improved by using the Intel DPDK technology and using user-mode processes rather than NICs to send and receive data. On an OVS, data is received and sent in the kernel mode, but on an EVS, data is processed in the user mode. Distributed Virtual Switch (DVS): Same as a physical switch does, a DVS constructs the network between VMs and connects VMs to external networks. A virtual NIC of a VM communicates with an external network by connecting to the DVS and then by connecting to the physical NIC of the host through the DVS uplink. Compared with traditional switches, using virtual switches reduces network devices and simplifies the network architecture, relieving the pressure of system management and maintenance. 02 Handout 1 *Property of STI  [email protected] Page 8 of 11 IT2314 HUAWEI CLOUD Network Services A Virtual Private Cloud (VPC) is a private and isolated virtual network on HUAWEI CLOUD. Users can configure IP address ranges, subnets, and security groups, assign EIPs, and allocate bandwidths in a VPC. Public NAT gateways and private NAT gateways are used in different scenarios to provide the network address translation. A public NAT gateway provides SNAT and DNAT so that cloud servers in a VPC can share EIPs to access the Internet. A private NAT gateway provides the network address translation for servers in a VPC. The EIP service provides independent public IP addresses and bandwidth for Internet access. EIPs can be bound to or unbound from ECSs, BMSs, virtual IP addresses, load balancers, and NAT gateways. This service provides various billing modes to meet diverse service requirements and allows cloud servers in a VPC to share the same private IP address to access or provide services accessible from an on-premises data center or a remote VPC. Storage How Does Cloud Storage Work? A storage medium is any technology -- including devices and materials -- used to place, keep and retrieve electronic data. In terms of data storage, the existing cloud storage products can achieve higher efficiency at lower cost. Therefore, cloud storage will be an inevitable choice for individuals and enterprises. Mainstream Storage Types Traditional servers have computing and storage coupled and use their local physical disks to store data. This is what we call the traditional block storage, where a disk is connected to a server through a bus, delivering low latency. However, the number of disks attached to the server is limited, so traditional servers have poor performance in capacity, bandwidth, and reliability. The explosive data growth poses high requirements on data reliability, which requires decoupled compute and storage. To address this, storage arrays appear. Traditional disk arrays comprise controllers and disk enclosures. Two or more controllers can be used to provide high reliability. By adding disk enclosures, the capacity of disk arrays can be hundreds of thousands of times larger than that of local disks. Disk arrays independently connect to servers through FC switches or IP switches. This is today's block storage. As the IT system further develops, enterprises want their files to be shared among multiple hosts for concurrent access. This is shared file storage. Shared file storage shares data in the same data center or equipment room. As more and more Internet applications need to access data over the Internet using terminal devices, object storage that supports HTTP and HTTPS protocols is widely used. Object storage allows applications to access data by calling APIs and adopts a distributed architecture featuring large capacity and high reliability. Block Storage Block storage cannot be directly used in an operating system. Before using a block device, you must format it and create a file system on it. Data in the operating system is stored as files. Block storage has the lowest latency among the three types of storage and is ideal for mission- critical applications such as databases and ERP systems. 02 Handout 1 *Property of STI  [email protected] Page 9 of 11 IT2314 File Storage Network File System (NFS): NFS is a file-sharing protocol between UNIX operating systems. It commonly applies to Linux clients. Common Internet File System (CIFS): CIFS is a protocol that allows programs to access files on remote computers over the Internet. It mainly applies to Windows clients. File storage provides petabyte (PB)-level capacity and ms-level latency and is perfect for scenarios where data needs to be shared among multiple compute nodes, such as HPC and office automation. Object Storage Object storage has large-scale data management capability, which is its biggest advantage over file storage. File Storage uses a hierarchical structure to manage all files and directories. If there are too many files or directories stored, the search performance will be greatly reduced. Object storage provides a flat structure where all objects are stored at the same logical layer. This keeps the object search speed almost unchanged even if there are tens of billions of objects. However, object storage uses application-level APIs instead of system-level APIs. Traditional applications need to be redeveloped when being migrated to object storage systems, which makes the popularization of object storage difficult. Object storage is applicable to scenarios such as big data, IoT, backup, and archive. It provides EB-level capacity and has the highest data durability among the three types of storage. Enterprise Storage Direct Attached Storage (DAS) connects an external storage device to an application server through the SCSI or FC interface, making the storage device part of the server. In this case, the data and operating system are not separated. Network Attached Storage (NAS) uses TCP/IP, ATM, and FDDI to connect storage devices, switches, and clients, and all these components form a private storage network. NAS integrates storage devices, network interfaces and Ethernet technology and stores data directly over Ethernet, which separates the storage function from the file server. Storage Area Network (SAN) is a private storage network that connects storage arrays and servers through switches. 02 Handout 1 *Property of STI  [email protected] Page 10 of 11 IT2314 Distributed Storage: Distrubuted storage systems virtualize the available storage resources across all hosts of an enterprise to a virtual storage device. This way, data is stored in different locations on the storage network, improving system reliability, availability, and access efficiency. As data grows exponentially, storage of massive amount of data imposes great pressure on local storage and brings heavy burden to existing storage systems. To relieve the pressure, we have to adopt distributed storage and distributed file systems. How can we ensure high performance and high availability of distributed storage? In addition to the backup, active-active, and multi-active architectures in the traditional architecture, multiple data copies are stored in the system to ensure high reliability and availability of the distributed storage system. If a storage node becomes faulty, the system can automatically switch the node's service to other nodes, achieving automatic fault tolerance. The distributed storage system leverages replication protocols to synchronize data to multiple storage nodes and ensures data consistency between copies. A piece of data has multiple copies, among which there is only one primary copy, and the rest are backup copies. Consistency is used to ensure data integrity when data is replicated from the primary copy to backup copies. HUAWEI CLOUD Storage Services Elastic Volume Service (EVS) provides persistent block storage for ECSs and BMSs. With data redundancy and cache acceleration techniques, EVS offers high availability, strong durability, and low latency. Users can format an EVS disk, create a file system on it, and store data persistently. Scalable File Service (SFS) is a network attached storage (NAS) service that provides scalable, high-performance file storage. With SFS, you can enjoy shared file access spanning ECSs, BMSs, and containers created on CCE and Cloud Container Instance (CCI). Object Storage Service (OBS) provides a stable, secure cloud storage that is scalable, efficient, and easy to use. It offers REST APIs and allows users to store any amount of unstructured data in any format. 02 Handout 1 *Property of STI  [email protected] Page 11 of 11

Use Quizgecko on...
Browser
Browser