Resource Reservation (Erl, Naserpour)
How can shared IT resources be protected from conflicts that can arise from concurrent access?
ProblemWhen two or more cloud service consumers attempt to instantiate the same shared IT resource, runtime conflicts can occur, including resource constraints due to lack of capacity.
SolutionA system is established whereby a portion of an IT resource (or one or more IT resources) is set aside exclusively for a given cloud service consumer.
ApplicationThe resource management system is used to define IT resource thresholds and to restrict access to reserved IT resources.
MechanismsAudit Monitor, Cloud Storage Device, Cloud Usage Monitor, Hypervisor, Logical Network Perimeter, Remote Administration System, Resource Management System, Resource Replication, Virtual Server
Compound PatternsBurst In, Burst Out to Private Cloud, Burst Out to Public Cloud, Cloud Authentication and Access Management, Elastic Environment, Infrastructure-as-a-Service (IaaS), Multitenant Environment, Platform-as-a-Service (PaaS), Private Cloud, Public Cloud, Resilient Environment, Secure Burst Out to Private Cloud/Public Cloud, Software-as-a-Service (SaaS)
A resource pool hierarchy to which an IT resource reservation system is applied (Part 1).
In the same resource pool hierarchy, more IT resources are being allocated to fulfill the increasing requests from Cloud Consumer A (1). Several IT resources are borrowed from Pool 2, up to a maximum amount that is pre-determined by the resource limit to ensure that Consumer B will not face resource constraints (Part 2).
A resource pool hierarchy to which an IT resource reservation system is applied (Part 3).
NIST Reference Architecture Mapping
This pattern relates to the highlighted parts of the NIST reference architecture, as follows: