Cloud Resource Orchestration

Cloud Resource Orchestration 

I. Introduction

The cloud computing paradigm is steadily shifting the course of computing away from physical hardware with locally managed software platforms toward virtualized, cloud-based services. This new paradigm, brought about by cloud computing, provides users with instant access to virtually unlimited computing resources and, at the same time, allows providers to deploy complex IT infrastructure as a service (IAAS).

There is a huge benefit from economies of scale and tremendous gains in multiplexing offered by the sharing of the underlying physical infrastructure using virtualization. But all these benefits come at great cost. The sheer scale and highly dynamic nature of available cloud platforms bring considerable new challenges to service providers. To realize these complicated cloud services, a control framework must be present which can orchestrate cloud resource configuration, provisioning, utilization and decommissioning, and real-time monitoring across extensively distributed physical resources.

The main goal of cloud resource orchestration is the successful hosting and delivery of cloud-based applications and services through achieving the quality of service (QoS) objectives of users and clients. QoS is composed of functional and non-functional attributes such as security, consistency, reliability, integrity, availability, statistics, scalability and cost.

II. Challenges in Resource Orchestration

Cloud resource orchestration is becoming challenging because of the increasing sophistication of services provided through the cloud, the rapid growth of datacenters and the high failure rate of commercial hardware. Dynamic service features require the orchestration of resources across the different domains of computation, storage and networking, across geographically separated datacenters and in a sequential manner. Each of these operations is fairly complex and highly susceptible to failure. The final hurdle of a resource orchestration platform is concurrently handling numerous similar orchestration requests.

Resource orchestration functions must be performed while dealing with huge numbers of simultaneous user requests, enforcing engineering rules and service policies, and performing error handling, all in a very dynamic environment.

III. Approaches to Cloud Resource Orchestration 

A. The Data-centric (DMF) Approach

One approach to resource orchestration is the data-centric management framework (DMF). This approach aims to maintain a conceptually centralized repository for data of all managed resources, including computational, storage and network devices. Every resource object has two copies which represent its state: the primary copy in the physical layer (physical device) and the secondary copy in the logical layer (resides in memory).

B.The Transactional Resource Orchestration Platform In the Cloud (TROPIC) Approach

This is a transactional orchestration resource platform for Infrastructure-as-a-Service (IaaS) cloud infrastructures. This approach to orchestration of physical resources is transactional, which can guarantee atomicity, consistency, isolation, and durability (ACID) of cloud service operations. Procedures are performed as transactions using ACID properties. Transactional semantics ensure that errors have no effect and that concurrent orchestrations will not violate rules due to clean abstraction.

IV. Conclusion

Implementing a cloud resource orchestration framework is not an easy task, and there are different ways to implement such a framework, depending on the nature of the cloud service being provided. But no matter which kind of orchestration is implemented, it must meet user expectations and prevent or at least handle errors fairly well, while providing simultaneous orchestration services. There are new approaches being developed as new problems arise, so the field is still developing and maturing. We have yet to fully realize all the benefits which cloud computing can offer.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

Sorry, comments are closed for this post.

The Internet of illness

The Internet of illness

The Internet of illness The number of postings about IoT solutions has continued to rise. It is a wave that hasn’t crested yet. I’ve posted several here on CloudTweaks as have a number of other authors. IoT topics from the industrial use, to what IoT is going to change around the world. It got me…

Are You Sure You Are Ready For The Cloud: Security

Are You Sure You Are Ready For The Cloud: Security

Cloud Security For the last several months, we have been discussing ways to make sure you are ready for the next step in your IT evolution: Cloud. When review the different steps of making sure you are ready, one that I have intentionally avoided was Security. I spoke to you about “Security of Business”, but…

The Open Performance Grid: Utopia Comes To Tech

The Open Performance Grid: Utopia Comes To Tech

The Open Performance Grid “For what greater wealth can there be than cheerfulness, peace of mind, and freedom from anxiety?” So wrote the English author and philosopher Sir Thomas More in his novel, Utopia, almost 500 years ago. More’s utopian dreams continue to thrive in one guise or another to the present day; in the…

The Most Powerful Free Cloudware Tools Available to Modern Businesses

The Most Powerful Free Cloudware Tools Available to Modern Businesses

5 Essential Cloud Tools for Your Innovative Business Why these cloudware tools are a must for any modern business Smart business owners are always on the lookout for ways to save money. One of the best ways is capitalising on some of the best free cloudware tools available to businesses. Sixty percent of small and medium…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor