The data center intranet illustrated in Figure 1 is a protected
network and we assume each customer outside this
protected cloud has been identified and authenticated before
its request is processed. We are not addressing the authentication/
identification nor security issues here. The rectangles
represent different component subsystems of management
with their functionalities specified.