TRAINING

 

COMMUNITY

MORE

API Design & Management

Artificial Intelligence (AI)

Big Data

Blockchain

Cloud Computing

Containerization

DevOps

Digital Transformation (coming soon)

Internet of Things (IoT)

Machine Learning

Microservices

Service Governance

Service Security

Service Technology

Service-Oriented Architecture (SOA)

Spanish Training (coming soon)

Arcitura Patterns Site

Arcitura on YouTube

Arcitura on LinkedIn

Arcitura on Facebook

Arcitura on Twitter

Community Home

Arcitura Books Published by Pearson Education

Contact Arcitura

eLearning Solutions

Home Study Solutions

Junior Programs (for ages 16-20+)

 

Public Workshop Calendar

Private Workshops

Download Catalog (PDF)

       

CERTIFICATIONS

     

Artificial Intelligence Specialist

Big Data Architect

Big Data Consultant

Big Data Engineer

Big Data Governance Specialist

Big Data Professional

Big Data Science Professional

Big Data Scientist

Blockchain Architect

Cloud Architect

Cloud Governance Specialist

Cloud Professional

Cloud Security Specialist

Cloud Storage Specialist

Cloud Technology Professional

Cloud Virtualization Specialist

Containerization Architect

DevOps Specialist

Digital Transformation Architect
(coming soon)

Digital Transformation Technology
Professional (coming soon)

IoT Architect

Junior Big Data Science
Professional

Junior Cloud Computing
Professional

Junior Digital Transformation
Professional

Machine Learning Specialist

Microservice Architect

Service API Specialist

Service Governance Specialist

Service Security Specialist

Service Technology Consultant

SOA Analyst

SOA Architect

SOA Professional

 

Acclaim/Credly Badges

Pearson Vue Exams

CCP   SOACP   BDSCP  
NEXT-GEN IT   JUNIOR

Cloud Computing Design Patterns

Chapter 1: Introduction

Objective of This Book
What This Book Does Not Cover
Who This Book Is For
Origin of This Book
Recommended Reading
How This Book Is Organized
Chapter 3: Sharing, Scaling and Elasticity Patterns
Chapter 4: Reliability, Resiliency and Recovery Patterns
Chapter 5: Data Management and Storage Device Patterns
Chapter 6: Virtual Server and Hypervisor Connectivity and
Management Patterns
Chapter 7: Monitoring, Provisioning and Administration Patterns
Chapter 8: Cloud Service and Storage Security Patterns
Chapter 9: Network Security, Identity & Access Management
and Trust Assurance Patterns
Chapter 10: Common Compound Patterns
Appendix A: Cloud Computing Mechanisms Glossary
Appendix B: Alphabetical Design Patterns Reference
Additional Information
Symbol Legend
Pattern Documentation Conventions
Updates, Errata, and Resources (www.servicetechbooks.com)
Cloud Computing Design Patterns (www.cloudpatterns.org)
What Is Cloud? (www.whatiscloud.com)
Referenced Specifications (www.servicetechspecs.com)
The Service Technology Magazine (www.servicetechmag.com)
CloudSchool.com™ Certified Cloud (CCP) Professional (www.cloudschool.com)

Chapter 2: Understanding Design Patterns

About Pattern Profiles
Requirement
Icon
Problem
Solution
Application
Mechanisms
About Compound Patterns
Design Pattern Notation.
Capitalization
Page Number References
Measures of Design Pattern Application
Working with This Catalog

Chapter 3: Sharing, Scaling and Elasticity Patterns

Shared Resources
Problem
Solution
Application
Mechanisms
Workload Distribution
Problem
Solution
Application
Mechanisms
Dynamic Scalability
Problem
Solution
Application
Mechanisms
Service Load Balancing
Problem
Solution
Application
Mechanisms
Elastic Resource Capacity
Problem
Solution
Application
Mechanisms
Elastic Network Capacity
Problem
Solution
Application
Mechanisms
Elastic Disk Provisioning
Problem
Solution
Application
Mechanisms
Load Balanced Virtual Server Instances
Problem
Solution
Application
Mechanisms
Load Balanced Virtual Switches
Problem
Solution
Application
Mechanisms
Service State Management
Problem
Solution
Application
Mechanisms
Storage Workload Management
Problem
Solution
Application
Mechanisms
Dynamic Data Normalization
Problem
Solution
Application
Mechanisms
Cross-Storage Device Vertical Tiering
Problem
Solution
Application
Mechanisms
Intra-Storage Device Vertical Data Tiering
Problem
Solution
Application
Mechanisms
Memory Over-Committing
Problem
Solution
Application
Mechanisms
NIC Teaming
Problem
Solution
Application
Mechanisms
Broad Access
Problem
Solution
Application
Mechanisms

Chapter 4: Reliability, Resiliency and Recovery Patterns

Resource Pooling
Problem
Solution
Application
Mechanisms
Resource Reservation
Problem
Solution
Application
Mechanisms
Hypervisor Clustering
Problem
Solution
Application
Mechanisms
Redundant Storage
Problem
Solution
Application
Mechanisms
Dynamic Failure Detection and Recovery
Problem
Solution
Application
Mechanisms
Multipath Resource Access
Problem
Solution
Application
Mechanisms
Redundant Physical Connection for Virtual Servers
Problem
Solution
Application
Mechanisms
Synchronized Operating State
Problem
Solution
Application
Mechanisms
Zero Downtime
Problem
Solution
Application
Mechanisms
Storage Maintenance Window
Problem
Solution
Application
Mechanisms
Virtual Server Auto Crash Recovery
Problem
Solution
Application
Mechanisms
Non-Disruptive Service Relocation
Problem
Solution
Application
Mechanisms

Chapter 5: Data Management and Storage

Device Patterns
Direct I/O Access
Problem
Solution
Application
Mechanisms
Direct LUN Access
Problem
Solution
Application
Mechanisms
Single Root I/O Virtualization
Problem
Solution
Application
Mechanisms
Cloud Storage Data at Rest Encryption
Problem
Solution
Application
Mechanisms
Cloud Storage Data Lifecycle Management
Problem
Solution
Application
Mechanisms
Cloud Storage Data Management
Problem
Solution
Application
Mechanisms
Cloud Storage Data Placement Compliance Check
Problem
Solution
Application
Mechanisms
Cloud Storage Device Masking
Problem
Solution
Application
Mechanisms
Cloud Storage Device Path Masking
Problem
Solution
Application
Mechanisms
Cloud Storage Device Performance Enforcement
Problem
Solution
Application
Mechanisms
Virtual Disk Splitting
Problem
Solution
Application
Mechanisms
Sub-LUN Tiering
Problem
Solution
Application
Mechanisms
RAID-Based Data Placement
Problem
Solution
Application
Mechanisms
IP Storage Isolation
Problem
Solution
Application
Mechanisms

Chapter 6: Virtual Server and Hypervisor

Connectivity and Management Patterns
Virtual Server Folder Migration
Problem
Solution
Application
Mechanisms
Persistent Virtual Network Configuration
Problem
Solution
Application
Mechanisms
Virtual Server Connectivity Isolation
Problem
Solution
Application
Mechanisms
Virtual Switch Isolation
Problem
Solution
Application
Mechanisms
Virtual Server NAT Connectivity
Problem
Solution
Application
Mechanisms
External Virtual Server Accessibility
Problem
Solution
Application
Mechanisms
Cross-Hypervisor Workload Mobility
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Anti-Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Connectivity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Virtual Server Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Virtual Server Anti-Affinity
Problem
Solution
Application
Mechanisms
Stateless Hypervisor
Problem
Solution
Application
Mechanisms

Chapter 7: Monitoring, Provisioning and Administration Patterns

Usage Monitoring
Problem
Solution
Application
Mechanisms
Pay-as-You-Go
Problem
Solution
Application
Mechanisms
Realtime Resource Availability
Problem
Solution
Application
Mechanisms
Rapid Provisioning
Problem
Solution
Application
Mechanisms
Platform Provisioning
Problem
Solution
Application
Mechanisms
Bare-Metal Provisioning
Problem
Solution
Application
Mechanisms
Automated Administration
Problem
Solution
Application
Mechanisms
Centralized Remote Administration
Problem
Solution
Application
Mechanisms
Resource Management
Problem
Solution
Application
Mechanisms
Self-Provisioning
Problem
Solution
Application
Mechanisms
Power Consumption Reduction
Problem
Solution
Application
Mechanisms

Chapter 8: Cloud Service and Storage Security Patterns

Trusted Platform BIOS
Problem
Solution
Application
Mechanisms
Geotagging
Problem
Solution
Application
Mechanisms
Hypervisor Protection
Problem
Solution
Application
Mechanisms
Cloud VM Platform Encryption
Problem
Solution
Application
Mechanisms
Trusted Cloud Resource Pools
Problem
Solution
Application
Mechanisms
Secure Cloud Interfaces and APIs
Problem
Solution
Application
Mechanisms
Cloud Resource Access Control
Problem
Solution
Application
Mechanisms
Detecting and Mitigating User-Installed VMs
Problem
Solution
Application
Mechanisms
Mobile BYOD Security
Problem
Solution
Application
Mechanisms
Cloud Data Breach Protection
Problem
Solution
Application
Mechanisms
Permanent Data Loss Protection
Problem
Solution
Application
Mechanisms
In-Transit Cloud Data Encryption
Problem
Solution
Application
Mechanisms

Chapter 9: Network Security, Identity & Access Management and Trust Assurance Patterns

Secure On-Premise Internet Access
Problem
Solution
Application
Mechanisms
Secure External Cloud Connection
Problem
Solution
Application
Mechanisms
Secure Connection for Scaled VMs
Problem
Solution
Application
Mechanisms
Cloud Denial-of-Service Protection
Problem
Solution
Application
Mechanisms
Cloud Traffic Hijacking Protection
Problem
Solution
Application
Mechanisms
Automatically Defined Perimeter
Problem
Solution
Application
Mechanisms
Cloud Authentication Gateway
Problem
Solution
Application
Mechanisms
Federated Cloud Authentication
Problem
Solution
Application
Mechanisms
Cloud Key Management
Problem
Solution
Application
Mechanisms
Trust Attestation Service
Problem
Solution
Application
Mechanisms
Collaborative Monitoring and Logging
Problem
Solution
Application
Mechanisms
Independent Cloud Auditing
Problem
Solution
Application
Mechanisms
Threat Intelligence Processing
Problem
Solution
Application
Mechanisms

Chapter 10: Common Compound Patterns

“Compound Pattern” vs. “Composite Pattern”
Compound Pattern Members
Joint Application vs. Coexistent Application
Private Cloud
Public Cloud
Software-as-a-Service (SaaS)
Platform-as-a-Service (PaaS)
Infrastructure-as-a-Service (IaaS)
Elastic Environment
Multitenant Environment
Resilient Environment
Cloud Bursting
Burst Out to Private Cloud
Burst Out to Public Cloud
Burst In
Secure Burst Out to Private Cloud/Public Cloud
Cloud Balancing
Cloud Authentication
Resource Workload Management
Isolated Trust Boundary

Appendix A: Cloud Computing Mechanisms Glossary
Appendix B: Alphabetical Design Patterns
Reference
About the Authors

Thomas Erl
Robert Cope
Amin Naserpour

Index
X
X