Cloud computing business trends and technologies

Detalles Bibliográficos
Otros Autores: Faynberg, Igor, author (author), Lu, Hui-Lan, author, Skuler, Dor, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Chichester, [England] : Wiley 2016.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009849082406719
Tabla de Contenidos:
  • Intro
  • CLOUD COMPUTING
  • Contents
  • About the Authors
  • Acknowledgments
  • 1 Introduction
  • References
  • 2 The Business of Cloud Computing
  • 2.1 IT Industry Transformation through Virtualization and Cloud
  • 2.2 The Business Model Around Cloud
  • 2.2.1 Cloud Providers
  • 2.2.2 Software and Service Vendors
  • 2.3 Taking Cloud to the Network Operators
  • References
  • 3 CPU Virtualization
  • 3.1 Motivation and History
  • 3.2 A Computer Architecture Primer
  • 3.2.1 CPU, Memory, and I/O
  • 3.2.2 How the CPU Works
  • 3.2.3 In-program Control Transfer: Jumps and Procedure Calls
  • 3.2.4 Interrupts and Exceptions-the CPU Loop Refined
  • 3.2.5 Multi-processing and its Requirements-The Need for an Operating System
  • 3.2.6 Virtual Memory-Segmentation and Paging
  • 3.2.7 Options in Handling Privileged Instructions and the Final Approximation of the CPU Loop
  • 3.2.8 More on Operating Systems
  • 3.3 Virtualization and Hypervisors
  • 3.3.1 Model, Requirements, and Issues
  • 3.3.2 The x86 Processor and Virtualization
  • 3.3.3 Dealing with a Non-virtualizable CPU
  • 3.3.4 I/O Virtualization
  • 3.3.5 Hypervisor Examples
  • 3.3.6 Security
  • References
  • 4 Data Networks-The Nervous System of the Cloud
  • 4.1 The OSI Reference Model
  • 4.1.1 Host-to-Host Communications
  • 4.1.2 Interlayer Communications
  • 4.1.3 Functional Description of Layers
  • 4.2 The Internet Protocol Suite
  • 4.2.1 IP-The Glue of the Internet
  • 4.2.2 The Internet Hourglass
  • 4.3 Quality of Service in IP Networks
  • 4.3.1 Packet Scheduling Disciplines and Traffic Specification Models
  • 4.3.2 Integrated Services
  • 4.3.3 Differentiated Services
  • 4.3.4 Multiprotocol Label Switching (MPLS)
  • 4.4 WAN Virtualization Technologies
  • 4.5 Software-Defined Network
  • 4.6 Security of IP
  • References
  • 5 Networking Appliances
  • 5.1 Domain Name System
  • 5.1.1 Architecture and Protocol.
  • 5.1.2 DNS Operation
  • 5.1.3 Top-Level Domain Labels
  • 5.1.4 DNS Security
  • 5.2 Firewalls
  • 5.2.1 Network Perimeter Control
  • 5.2.2 Stateless Firewalls
  • 5.2.3 Stateful Firewalls
  • 5.2.4 Application-Layer Firewalls
  • 5.3 NAT Boxes
  • 5.3.1 Allocation of Private IP Addresses
  • 5.3.2 Architecture and Operation of the NAT Boxes
  • 5.3.3 Living with NAT
  • 5.3.4 Carrier-Grade NAT
  • 5.4 Load Balancers
  • 5.4.1 Load Balancing in a Server Farm
  • 5.4.2 A Practical Example: A Load-Balanced Web Service
  • 5.4.3 Using DNS for Load Balancing
  • References
  • 6 Cloud Storage and the Structure of a Modern Data Center
  • 6.1 Data Center Basics
  • 6.1.1 Compute
  • 6.1.2 Storage
  • 6.1.3 Networking
  • 6.2 Storage-Related Matters
  • 6.2.1 Direct-Attached Storage
  • 6.2.2 Network-Attached Storage
  • 6.2.3 Storage Area Network
  • 6.2.4 Convergence of SAN and Ethernet
  • 6.2.5 Object Storage
  • 6.2.6 Storage Virtualization
  • 6.2.7 Solid-State Storage
  • References
  • 7 Operations, Management, and Orchestration in the Cloud
  • 7.1 Orchestration in the Enterprise
  • 7.1.1 The Service-Oriented Architecture
  • 7.1.2 Workflows
  • 7.2 Network and Operations Management
  • 7.2.1 The OSI Network Management Framework and Model
  • 7.2.2 Policy-Based Management
  • 7.3 Orchestration and Management in the Cloud
  • 7.3.1 The Life Cycle of a Service
  • 7.3.2 Orchestration and Management in OpenStack
  • 7.4 Identity and Access Management
  • 7.4.1 Implications of Cloud Computing
  • 7.4.2 Authentication
  • 7.4.3 Access Control
  • 7.4.4 Dynamic Delegation
  • 7.4.5 Identity Federation
  • 7.4.6 OpenStack Keystone (A Case Study)
  • References
  • Appendix: Selected Topics
  • A.1 The IETF Operations and Management Standards
  • A.1.1 SNMP
  • A.1.2 COPS
  • A.1.3 Network Configuration (NETCONF) Model and Protocol
  • A.2 Orchestration with TOSCA
  • A.3 The REST Architectural Style.
  • A.3.1 The Origins and Development of Hypermedia
  • A.3.2 Highlights of the World Wide Web Architecture
  • A.3.3 The Principles of REST
  • A.4 Identity and Access Management Mechanisms
  • A.4.1 Password Management
  • A.4.2 Kerberos
  • A.4.3 Access Control Lists
  • A.4.4 Capability Lists
  • A.4.5 The Bell-LaPadula Model
  • A.4.6 Security Assertion Markup Language
  • A.4.7 OAuth 2.0
  • A.4.8 OpenID Connect
  • A.4.9 Access Control Markup Language
  • References
  • Index
  • EULA.