Cloud computing business trends and technologies
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Chichester, [England] :
Wiley
2016.
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009849082406719 |
Tabla de Contenidos:
- Intro
- CLOUD COMPUTING
- Contents
- About the Authors
- Acknowledgments
- 1 Introduction
- References
- 2 The Business of Cloud Computing
- 2.1 IT Industry Transformation through Virtualization and Cloud
- 2.2 The Business Model Around Cloud
- 2.2.1 Cloud Providers
- 2.2.2 Software and Service Vendors
- 2.3 Taking Cloud to the Network Operators
- References
- 3 CPU Virtualization
- 3.1 Motivation and History
- 3.2 A Computer Architecture Primer
- 3.2.1 CPU, Memory, and I/O
- 3.2.2 How the CPU Works
- 3.2.3 In-program Control Transfer: Jumps and Procedure Calls
- 3.2.4 Interrupts and Exceptions-the CPU Loop Refined
- 3.2.5 Multi-processing and its Requirements-The Need for an Operating System
- 3.2.6 Virtual Memory-Segmentation and Paging
- 3.2.7 Options in Handling Privileged Instructions and the Final Approximation of the CPU Loop
- 3.2.8 More on Operating Systems
- 3.3 Virtualization and Hypervisors
- 3.3.1 Model, Requirements, and Issues
- 3.3.2 The x86 Processor and Virtualization
- 3.3.3 Dealing with a Non-virtualizable CPU
- 3.3.4 I/O Virtualization
- 3.3.5 Hypervisor Examples
- 3.3.6 Security
- References
- 4 Data Networks-The Nervous System of the Cloud
- 4.1 The OSI Reference Model
- 4.1.1 Host-to-Host Communications
- 4.1.2 Interlayer Communications
- 4.1.3 Functional Description of Layers
- 4.2 The Internet Protocol Suite
- 4.2.1 IP-The Glue of the Internet
- 4.2.2 The Internet Hourglass
- 4.3 Quality of Service in IP Networks
- 4.3.1 Packet Scheduling Disciplines and Traffic Specification Models
- 4.3.2 Integrated Services
- 4.3.3 Differentiated Services
- 4.3.4 Multiprotocol Label Switching (MPLS)
- 4.4 WAN Virtualization Technologies
- 4.5 Software-Defined Network
- 4.6 Security of IP
- References
- 5 Networking Appliances
- 5.1 Domain Name System
- 5.1.1 Architecture and Protocol.
- 5.1.2 DNS Operation
- 5.1.3 Top-Level Domain Labels
- 5.1.4 DNS Security
- 5.2 Firewalls
- 5.2.1 Network Perimeter Control
- 5.2.2 Stateless Firewalls
- 5.2.3 Stateful Firewalls
- 5.2.4 Application-Layer Firewalls
- 5.3 NAT Boxes
- 5.3.1 Allocation of Private IP Addresses
- 5.3.2 Architecture and Operation of the NAT Boxes
- 5.3.3 Living with NAT
- 5.3.4 Carrier-Grade NAT
- 5.4 Load Balancers
- 5.4.1 Load Balancing in a Server Farm
- 5.4.2 A Practical Example: A Load-Balanced Web Service
- 5.4.3 Using DNS for Load Balancing
- References
- 6 Cloud Storage and the Structure of a Modern Data Center
- 6.1 Data Center Basics
- 6.1.1 Compute
- 6.1.2 Storage
- 6.1.3 Networking
- 6.2 Storage-Related Matters
- 6.2.1 Direct-Attached Storage
- 6.2.2 Network-Attached Storage
- 6.2.3 Storage Area Network
- 6.2.4 Convergence of SAN and Ethernet
- 6.2.5 Object Storage
- 6.2.6 Storage Virtualization
- 6.2.7 Solid-State Storage
- References
- 7 Operations, Management, and Orchestration in the Cloud
- 7.1 Orchestration in the Enterprise
- 7.1.1 The Service-Oriented Architecture
- 7.1.2 Workflows
- 7.2 Network and Operations Management
- 7.2.1 The OSI Network Management Framework and Model
- 7.2.2 Policy-Based Management
- 7.3 Orchestration and Management in the Cloud
- 7.3.1 The Life Cycle of a Service
- 7.3.2 Orchestration and Management in OpenStack
- 7.4 Identity and Access Management
- 7.4.1 Implications of Cloud Computing
- 7.4.2 Authentication
- 7.4.3 Access Control
- 7.4.4 Dynamic Delegation
- 7.4.5 Identity Federation
- 7.4.6 OpenStack Keystone (A Case Study)
- References
- Appendix: Selected Topics
- A.1 The IETF Operations and Management Standards
- A.1.1 SNMP
- A.1.2 COPS
- A.1.3 Network Configuration (NETCONF) Model and Protocol
- A.2 Orchestration with TOSCA
- A.3 The REST Architectural Style.
- A.3.1 The Origins and Development of Hypermedia
- A.3.2 Highlights of the World Wide Web Architecture
- A.3.3 The Principles of REST
- A.4 Identity and Access Management Mechanisms
- A.4.1 Password Management
- A.4.2 Kerberos
- A.4.3 Access Control Lists
- A.4.4 Capability Lists
- A.4.5 The Bell-LaPadula Model
- A.4.6 Security Assertion Markup Language
- A.4.7 OAuth 2.0
- A.4.8 OpenID Connect
- A.4.9 Access Control Markup Language
- References
- Index
- EULA.