ITM 703 Lecture 6: ITM 703 Week 6
Document Summary
Logical network perimeter: ownership of a network belongs to one organization, boundary. Isolate it resources from anyone who is not authorized, non-users and cloud consumers. Figure 7. 4: at the bottom is internal network, virtual network is in the cloud network (boundary, after firewall. Lab environment is a web portal: all resources are accessed using an interface, user friendly interface is made available to consumers to manage all the resources. Cloud storage device: storage can be virtualized. Object storage interfaces: storage manages objects. Database storage interfaces: tables and relationships, can"t use both at the same time, relational data storage, microsoft sql server, mysql. In mac, post-grd sql: supports relationships, protects data integrity etc, can use sql, non-relational data storage, nosql storage. Cloud usage monitor: two main reasons of using monitoring, metering of usage resources of client for billing purposes, monitoring can help to find out any event occurrence such as failures and unusual occurrences.