As for the concept of “cloud computing”, it has been gradually accepted in China since 2012. Until now, many people have been concerned about what fields and businesses cloud computing covers. What capabilities are provided? It’s not very clear. Now, as an architect of New Rui Cloud, I would like to share with you my understanding of “cloud computing”, and welcome your suggestions and criticisms.

The current cloud computing industry includes private cloud, public cloud, hybrid cloud, etc., but generally speaking, “cloud computing” refers to the public cloud. In this article, we will start with the level of public cloud inclusion, and we will continue to publish new articles on cloud computing to give you a complete understanding of cloud computing.

Public cloud includes the following layers: 1. IDC room

IDC room is divided into self-built equipment room/operators leasing managed/tripartite room rental hosting three models, such as, self-built or hosting here, can not escape the export network, unicom, telecom, mobile, campus, international network export), IP address, heavy current and weak current, the security of these basic inputs, the so-called great oaks grow from little acorns, It is particularly important to select reliable IDCs. Generally, public cloud vendors use multi-redundant/multi-line BGP/ dedicated network line technologies for multi-domain interconnection and interworking.

2. Basic server resource hardware

Provide the basic core computing ability, here CPU/ memory/motherboard/local hard disk /RAID card/network sub-card /GPU (FPGA) graphics card, is to measure the level of this part of the ability of the standard;

3. Basic network resource hardware

At present, Xinrui Cloud has entered the era of 40GE backbone network. This part of the network is generally divided into four layers according to services: wide area Network, Local Area Network, storage switching network, and management network. The four networks are connected with their respective network switches through optical fibers through different network sub-card interfaces, which are physically isolated from each other to ensure basic security, efficient transmission and stable operation of the overall network.

4. Basic storage resource hardware

You can choose proprietary brand centralized storage, including FCSAN, NAS, and IPSAN, or distributed storage.

5. Basic network security hardware

You need to configure anti-ddos attack devices, traffic cleaning, network firewall, antivirus wall, vulnerability scanning, log monitoring, network monitoring management, fortress machine, and other security software and systems.

6. Basic virtualization software

Currently, you can choose from four major vendors: RedHat KVM, Ctrix XEN, Microsoft HyperV, VMware Vsphere, and other virtualization software such as Oracle.

7. Basic virtual network software

Currently, SDN and NFV devices are used and sD-WAN devices are used to manage VPC services using software such as OpenDaylight and NSX, including routers, firewalls, NAT gateways, load balancers, simple DDoS, VPN, interworking gateways, and VXLAN

8. Cloud management platform

Unified management of computing, network, storage, security, and virtual resources, resource allocation and scheduling, permission management, security detection, operation and maintenance monitoring, troubleshooting, and repair; Here, real-time 24-hour operation and maintenance monitoring is usually carried out through the large screen. Once intrusion, attack, and security risks are found, operation and maintenance personnel will conduct timely investigation.

This is the first lesson I give you today. I hope you will continue to pay attention to the following articles.