Contents

CHAPTER 1: Introduction

Objective of This Book

What This Book Does Not Cover

Who This Book Is For

Origin of This Book

Recommended Reading

How This Book Is Organized

Chapter 3: Sharing, Scaling and Elasticity Patterns

Chapter 4: Reliability, Resiliency and Recovery Patterns

Chapter 5: Data Management and Storage Device Patterns

Chapter 6: Virtual Server and Hypervisor Connectivity and Management Patterns

Chapter 7: Monitoring, Provisioning and Administration Patterns

Chapter 8: Cloud Service and Storage Security Patterns

Chapter 9: Network Security, Identity & Access Management and Trust Assurance Patterns

Chapter 10: Common Compound Patterns

Appendix A: Cloud Computing Mechanisms Glossary

Appendix B: Alphabetical Design Patterns Reference

Additional Information

Symbol Legend

Pattern Documentation Conventions

Updates, Errata, and Resources (www.servicetechbooks.com)

Cloud Computing Design Patterns (www.cloudpatterns.org)

What Is Cloud? (www.whatiscloud.com)

Referenced Specifications (www.servicetechspecs.com)

The Service Technology Magazine (www.servicetechmag.com)

CloudSchool.com™ Certified Cloud (CCP) Professional (www.cloudschool.com)

Social Media and Notification

CHAPTER 2: Understanding Design Patterns

About Pattern Profiles

Requirement

Icon

Problem

Solution

Application

Mechanisms

About Compound Patterns

Design Pattern Notation

Capitalization

Page Number References

Measures of Design Pattern Application

Working with This Catalog

CHAPTER 3: Sharing, Scaling and Elasticity Patterns

Shared Resources

Problem

Solution

Application

Mechanisms

Workload Distribution

Problem

Solution

Application

Mechanisms

Dynamic Scalability

Problem

Solution

Application

Mechanisms

Service Load Balancing

Problem

Solution

Application

Mechanisms

Elastic Resource Capacity

Problem

Solution

Application

Mechanisms

Elastic Network Capacity

Problem

Solution

Application

Mechanisms

Elastic Disk Provisioning

Problem

Solution

Application

Mechanisms

Load Balanced Virtual Server Instances

Problem

Solution

Application

Mechanisms

Load Balanced Virtual Switches

Problem

Solution

Application

Mechanisms

Service State Management

Problem

Solution

Application

Mechanisms

Storage Workload Management

Problem

Solution

Application

Mechanisms

Dynamic Data Normalization

Problem

Solution

Application

Mechanisms

Cross-Storage Device Vertical Tiering

Problem

Solution

Application

Mechanisms

Intra-Storage Device Vertical Data Tiering

Problem

Solution

Application

Mechanisms

Memory Over-Committing

Problem

Solution

Application

Mechanisms

NIC Teaming

Problem

Solution

Application

Mechanisms

Broad Access

Problem

Solution

Application

Mechanisms

CHAPTER 4: Reliability, Resiliency and Recovery Patterns

Resource Pooling

Problem

Solution

Application

Mechanisms

Resource Reservation

Problem

Solution

Application

Mechanisms

Hypervisor Clustering

Problem

Solution

Application

Mechanisms

Redundant Storage

Problem

Solution

Application

Mechanisms

Dynamic Failure Detection and Recovery

Problem

Solution

Application

Mechanisms

Multipath Resource Access

Problem

Solution

Application

Mechanisms

Redundant Physical Connection for Virtual Servers

Problem

Solution

Application

Mechanisms

Synchronized Operating State

Problem

Solution

Application

Mechanisms

Zero Downtime

Problem

Solution

Application

Mechanisms

Storage Maintenance Window

Problem

Solution

Application

Mechanisms

Virtual Server Auto Crash Recovery

Problem

Solution

Application

Mechanisms

Non-Disruptive Service Relocation

Problem

Solution

Application

Mechanisms

CHAPTER 5: Data Management and Storage Device Patterns

Direct I/O Access

Problem

Solution

Application

Mechanisms

Direct LUN Access

Problem

Solution

Application

Mechanisms

Single Root I/O Virtualization

Problem

Solution

Application

Mechanisms

Cloud Storage Data at Rest Encryption

Problem

Solution

Application

Mechanisms

Cloud Storage Data Lifecycle Management

Problem

Solution

Application

Mechanisms

Cloud Storage Data Management

Problem

Solution

Application

Mechanisms

Cloud Storage Data Placement Compliance Check

Problem

Solution

Application

Mechanisms

Cloud Storage Device Masking

Problem

Solution

Application

Mechanisms

Cloud Storage Device Path Masking

Problem

Solution

Application

Mechanisms

Cloud Storage Device Performance Enforcement

Problem

Solution

Application

Mechanisms

Virtual Disk Splitting

Problem

Solution

Application

Mechanisms

Sub-LUN Tiering

Problem

Solution

Application

Mechanisms

RAID-Based Data Placement

Problem

Solution

Application

Mechanisms

IP Storage Isolation

Problem

Solution

Application

Mechanisms

CHAPTER 6: Virtual Server and Hypervisor Connectivity and Management Patterns

Virtual Server Folder Migration

Problem

Solution

Application

Mechanisms

Persistent Virtual Network Configuration

Problem

Solution

Application

Mechanisms

Virtual Server Connectivity Isolation

Problem

Solution

Application

Mechanisms

Virtual Switch Isolation

Problem

Solution

Application

Mechanisms

Virtual Server NAT Connectivity

Problem

Solution

Application

Mechanisms

External Virtual Server Accessibility

Problem

Solution

Application

Mechanisms

Cross-Hypervisor Workload Mobility

Problem

Solution

Application

Mechanisms

Virtual Server-to-Host Affinity

Problem

Solution

Application

Mechanisms

Virtual Server-to-Host Anti-Affinity

Problem

Solution

Application

Mechanisms

Virtual Server-to-Host Connectivity

Problem

Solution

Application

Mechanisms

Virtual Server-to-Virtual Server Affinity

Problem

Solution

Application

Mechanisms

Virtual Server-to-Virtual Server Anti-Affinity

Problem

Solution

Application

Mechanisms

Stateless Hypervisor

Problem

Solution

Application

Mechanisms

CHAPTER 7: Monitoring, Provisioning and Administration Patterns

Usage Monitoring

Problem

Solution

Application

Mechanisms

Pay-as-You-Go

Problem

Solution

Application

Mechanisms

Realtime Resource Availability

Problem

Solution

Application

Mechanisms

Rapid Provisioning

Problem

Solution

Application

Mechanisms

Platform Provisioning

Problem

Solution

Application

Mechanisms

Bare-Metal Provisioning

Problem

Solution

Application

Mechanisms

Automated Administration

Problem

Solution

Application

Mechanisms

Centralized Remote Administration

Problem

Solution

Application

Mechanisms

Resource Management

Problem

Solution

Application

Mechanisms

Self-Provisioning

Problem

Solution

Application

Mechanisms

Power Consumption Reduction

Problem

Solution

Application

Mechanisms

CHAPTER 8: Cloud Service and Storage Security Patterns

Trusted Platform BIOS

Problem

Solution

Application

Mechanisms

Geotagging

Problem

Solution

Application

Mechanisms

Hypervisor Protection

Problem

Solution

Application

Mechanisms

Cloud VM Platform Encryption

Problem

Solution

Application

Mechanisms

Trusted Cloud Resource Pools

Problem

Solution

Application

Mechanisms

Secure Cloud Interfaces and APIs

Problem

Solution

Application

Mechanisms

Cloud Resource Access Control

Problem

Solution

Application

Mechanisms

Detecting and Mitigating User-Installed VMs

Problem

Solution

Application

Mechanisms

Mobile BYOD Security

Problem

Solution

Application

Mechanisms

Cloud Data Breach Protection

Problem

Solution

Application

Mechanisms

Permanent Data Loss Protection

Problem

Solution

Application

Mechanisms

In-Transit Cloud Data Encryption

Problem

Solution

Application

Mechanisms

CHAPTER 9: Network Security, Identity & Access Management and Trust Assurance Patterns

Secure On-Premise Internet Access

Problem

Solution

Application

Mechanisms

Secure External Cloud Connection

Problem

Solution

Application

Mechanisms

Secure Connection for Scaled VMs

Problem

Solution

Application

Mechanisms

Cloud Denial-of-Service Protection

Problem

Solution

Application

Mechanisms

Cloud Traffic Hijacking Protection

Problem

Solution

Application

Mechanisms

Automatically Defined Perimeter

Problem

Solution

Application

Mechanisms

Cloud Authentication Gateway

Problem

Solution

Application

Mechanisms

Federated Cloud Authentication

Problem

Solution

Application

Mechanisms

Cloud Key Management

Problem

Solution

Application

Mechanisms

Trust Attestation Service

Problem

Solution

Application

Mechanisms

Collaborative Monitoring and Logging

Problem

Solution

Application

Mechanisms

Independent Cloud Auditing

Problem

Solution

Application

Mechanisms

Threat Intelligence Processing

Problem

Solution

Application

Mechanisms

CHAPTER 10: Common Compound Patterns

“Compound Pattern” vs. “Composite Pattern”

Compound Pattern Members

Joint Application vs. Coexistent Application

Private Cloud

Public Cloud

Software-as-a-Service (SaaS)

Platform-as-a-Service (PaaS)

Infrastructure-as-a-Service (IaaS)

Elastic Environment

Multitenant Environment

Resilient Environment

Cloud Bursting

Burst Out to Private Cloud

Burst Out to Public Cloud

Burst In

Secure Burst Out to Private Cloud/Public Cloud

Cloud Balancing

Cloud Authentication

Resource Workload Management

Isolated Trust Boundary

APPENDIX A: Cloud Computing Mechanisms Glossary

APPENDIX B: Alphabetical Design Patterns Reference

About the Authors

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.193.7