Cloud Computing UNIT I, II
Cloud Computing UNIT I, II
INTRODUCTION:
The term cloud refers to a network or the internet. It is a technology that uses remote servers on
the internet to store, manage, and access data online rather than local drives.
The data can be anything such as files, images, documents, audio, video, and more.
1
Cloud computing comprises of various phases, which include grid and utility computing, application
service providers (ASP) and Software as a Service (SaaS).
Though the concept of delivering computing resources through a universal network was started in the
1960s, intergalactic computer network _x0000_t75
was introduced
... by J.C.R. Licklider.
His dream was for everyone on the earth to be connected with anyone and be able to access programs
and data at any location from any place.
In 1960, the famous scientist John McCarthy predicts that the computation being available as pubic
service.
The first cloud computing to have arrived in the 1999, which pioneered the idea of delivering enterprise
applications through a simple website.
The concepts behind the cloud computing are not new, whereas all these concepts are really It was in the
late 1990s that companies such as Sun Microsystems decided to introduce the concept called ‘the
network is the computer’.
2
FOLLOWING ARE THE FIVE CHARACTERISTICS OF CLOUD COMPUTING:
1.On-demand self-services
3.Rapid elasticity
_x0000_t75 ...
4.Resource pooling
5.Measured service
1. On-demand self-services: The Cloud computing services does not require any human
administrators, user themselves are able to provision, monitor and manage computing resources
as needed.
On-demand self service ,mean that a customer can request and receive access to a service offering
without an administrator or some part of support staff having to full fil the request manually.
2. Broad network access: The Computing services are generally provided over standard networks
and heterogeneous devices.
The service can be accessed from any location (using any type of device). Eg: anywhere access
at anytime.
3. Rapid elasticity: The Computing services should have IT resources that are able to scale out and
in quickly and on as needed basis.
Whenever the user require services it is provided to him and it is scale out as soon as its
requirement gets over.
3
4. Resource pooling: The IT resource (e.g., networks, servers, storage, applications, and services)
present are shared across multiple applications and occupant in an uncommitted manner.
5. Measured service: The resource utilization is tracked for each application and occupant it will
provide both the user and the resource provider with an account of what has been used.
This is done for various reasons like monitoring billing and effective use of resource.
Cloud computing can enable constant flow of information between service providers and the end
users. Other remote systems would struggle with such a task because they are based on database that is
largely outdated.
which information can be accessed gives confidence to the employees of the outsourcing organization,
so that they can continue with their usual routine despite the introduction of cloud computing.
Microsoft is putting its old office software and file...sharing application, SharePoint, on the cloud
_x0000_t75
alongside developer tools in its Azure platform, which give sold customers the comfort of having their
own stacks.
Advantages of Cloud Computing in IT Field
The Fixed Cost Advantage
Keeping Data Safe
The Possible Disadvantages of Cloud Computing
Advantages of Cloud Computing
Disadvantages of Cloud Computing
4
Advantages of cloud computing diagram
_x0000_t75 ...
The company to which you outsource, the functionality must be able to deliver a seamless service via the
Internet or else you have to review the contract.
If they do not have the capacity to do this effectively, you might bring forward a suggestion for sharing
costs and profits.
Make sure that at the very beginning of the relationship, these issues are tested and clarified.
5
It is possible for anonymous computer hackers to gain access to the business information in the cloud. A
discontented former employee known to the company may be able to guess passwords or answer your
security questions and get into the accounts to do harm or worse.
There have been a couple of such high-profi led incidents revealed in recent times, somewhere online
services and secure data went offl ine for some period of time, during which their customers’ accounts
were inaccessible.
The key to using cloud hosting safely is finding a conscientious provider that provides back-up programs
so your online data can also be stored domestically.
Cost reduction: Cloud computing lessens paperwork, enterprise deal charges and minimizes the
financial Endeavour in hardware. Moving your enterprise to ‘the cloud’ in addition lessens the want
for an employee.
Scalability: Cloud computing services sanction enterprises to only compensate for what they uselike
electrical power and water. As the business grows, user can put up by adding more server space.
Levels the playing field: Sharing IT resources with other companies reduces the cost of licensing
software and retail servers.
Easier collaboration: Cloud computing services allow to access any time from any computer, itis
easy to work together with employees in remote locations.
Affordable: With cloud computing, it is possible to reduce operational costs and investment
expenditures on hardware, software licenses and implementation services.
Scalable and flexible: Cloud computing can sanction to maximize supplies for better competenceand
lessen unused capacity. It can also scale up or downward to meet the varying demands of the
business.
6
Efficiency: Cloud computing renders the gain of divided hardware, automated and
recognizabletechnologies. The employees have the right to use the database fromeverywhere by
using anyPC, mobile device or browser. It also reduces overall energy usage and physical presence.
Security concerns: The main concern with cloud computing is having your data easily reachedvia
the web. Although security is stretched and is getting even more advanced as technology providers
perfect the framework, it is still an anxiety.
Risk of losing internet connection: If there is no Internet connection, the database accessing isvery
difficult.
Limited resources for customizations: One can require in-depth customizations and integrationwith
his current systems for his daily business functions. Cloud computing may not be accommodating to
his needs.
Availability: If it happens, the cloud service goes down unexpectedly, leaving you without important
information for hours or more? Then how is it possible to get reliability in retrieval of data isyet
another challenge.
Data mobility and ownership: In cloud environment, it is possible get back the data safely even
when the cloud service is stopped. How can you be assured
_x0000_t75 ... that the service provider will wipe out
your data once you have cancelled the service?
Privacy: How much data the cloud service companies are collecting and how are they using the
information?
2. User’s perspective:
It enables computing services in a simpler, more responsive model without complete knowledge of the
underlying technology.
It is an effective service acquisition and delivery model for IT resources if properly implemented
within an all-inclusive technology strategy.
Cloud computing can help to improve overall business performance while controlling the costs of
distributing IT resources to the organization.
Grid computing: It defined as an extension of distributed and parallel computing in which a super
and virtual computer consists of a number of networked and loosely coupled computers that act
together to perform enormous tasks.
Utility computing: When the resources used in computing process are packaged as a metered service
similar to electricity a traditional public utility.
TYPES OF CLOUD:
8
The operations of a business are carried outline one place and the functions in some remote place; it is
possible with the help of technology, that is cloud computing. Cloud computing has an advantage for
the businesses to increase their IT functionality without adding extra infrastructure or software.
Cloud computing can be classified into four types based on the location of the cloud:
1. Public cloud: This computing infrastructure is hosted at the vendor’s workplace. The end
user cannot view the infrastructure. The computing infrastructure is shared between companies.
2. Private cloud: Here the computing infrastructure is dedicated to the customer and Is not
shared with any other companies. They are costly and highly secure than public clouds.
Private clouds may be hosted externally as well as in their own premise hosted clouds.
3. Hybrid cloud: Organizations can submit less valued applications in public cloud and high
valued applications in the private cloud. The combination is known as hybrid cloud. Cloud bursting is
used to define a system where the organization uses its own infrastructure for normal usage and cloud
is used for peak times.
4. Community cloud: The cloud infrastructure is shared between the companies of the same
community. For example, all the government organizations in a city can share the same cloud but not
the non-governmental organizations.
_x0000_t75 ...
Six different types of cloud computing and their offering to businesses are listed as follows:
1. WWW-based cloud computing service is a type of cloud service that exploits certain web
service functionalities, rather than deploying applications. For example, it can use Google Maps API.
2. Software as a service is an idea, where an application can be used by multiple tenants,
using the browser. For example, SaaS solutions are used in sales, ERP and HR.
3. Platform as a service is a variant of SaaS, one can run their own applications but by
executing on the cloud provider’s infrastructure.
4. Utility cloud computing services offer virtual storage and server options, where the
companies can access it on demand. This allows easy creation of virtual data centre.
5. Managed services are the oldest cloud computing solutions. In this, a cloud computing
provider utilizes an application than the end customers. Examples are using anti-spam services and
application monitoring.
6. Service commerce is a mix of SaaS and managed services. It provides a hub of services,
where the end user interacts. Examples are tracking expenses, virtual assistant services and travel
bookings.
Public Cloud:
A public cloud is based on the standard cloud computing model, where the service provider makes the
resources such as storage and applications available to the public over the WWW.
These services may be free or on a pay-per-usage model. The advantages of using a public cloud
computing service are as follows:
10
CLOUD INFRASTRUCTURE:
Scale:The potential offered by cloud computing is nearly unlimited in scalability. For this purpose,
some application design guidelines are discussed as follows:
11
Start simple: Avoid complex design, optimizations for simplicity and performance enhancements.
It is a good idea to start with easiest application and checks the scalability of the cloud.
Split application functions and couple loosely: Separate systems should be utilized for different
parts of program functionality and bypass the synchronous attachments between them.
Deployment cluster: Rather than a single system to serve all users, consider forming multiple
clusters, each processing a subtask of an application. This is often called as ‘sharing’.
The advantages of cloud computing in terms of scalability are as follows:
● Inexpensive testing
● Reduced risk
● Ability to segment the customer base
● Auto-scaling based on the application load
Fail:Sometimes and at some point, an application will fail. Some follow-ups should be considered
while designing on-premise or SaaS application such as ‘doomsday’ scenarios.
Get back up quickly: The launching of new application clusters in order to recover data quickly
must be automated.
Data considerations: When an application fails, data persistence and system cannot be ascertained.
It is advisable to move all data to persistent_x0000_t75
storage and...confirm it is replicated and distributed to
ensure data preservation. The system state is restored and used for the recovery process, and thus
the system can be restarted from the point of failure.
Manage:The management of making the deploying cloud applications as virtual appliances is very
easy.The software which is needed for the entire lifecycle in the cloud should be brought by the
appliances.Managements workload is reduced because of deploying applications in cloud. It should
be developed in a systematic and consistent manner.
The advantages of designing the application in the cloud include the following:
● Cost reduction
● Reduced overheads
● Eliminates application sprawl
● Reduces the chance for errors
12
The X-axis labelled ‘percentage with technology in place’ represents the rate of adoption. The vertical
axis is labelled ‘percentage currently investing’ represents the rate of investment. In this analysis, the
terms ‘low’ and ‘high’ are relative to the technologies that are being developed.
Represents a chart with different parameters such as low, moderate and high rate of investment; and low,
moderate and high rate of adoption. Each technology falls in any one of the nine parameters.
High rate of investment/adoption: ERP, business intelligence systems, CRM systems and enterprise
collaboration falls under this sector.
Moderate rate of investment/high rate of adoption: Systems like human resource management systems
(HRMS) fall in this sector.
High rate of investment/moderate rate of adoption: When there is an increase in investment than the
adoption, it results in growth of technology. Windows 7 falls in this sector.
Moderate rate of investment/moderate rate of adoption: Technologies such as legacy system renewal,
SaaS and unifi ed communication fall in this category. These technologies will grow in a slow and
steady pace.
High rate of investment/low rate of adoption: Mobile applications falls in this sector, which has high
rate of investment, but adoption rate is minimal.
Low rate of investment/moderate rate of adoption: Supply chain management falls in this sector.
Low rate of investment/low rate of adoption: Technologies like virtualization (desktop),tablet,
IaaS, environmental management solutions and PaaS fall in this sector.
When a technology has more capability, but adoption rate is low, then organizations will not be
interested in adopting them. Cloud computing technology changed its focus from industry to real-world
problems. _x0000_t75 ...
The major trends that emerged in cloud computing technology are Small, medium business and micro-
business Supply chains management, media and digital content, and legacy systems On-the-fl y access
Hybrid cloud model Growth in stack-as-a-service
Virtualization
Data Growth
Energy and Green IT
Complex Resource Tracking
Consumerization and Social Software
SERVICE MODELS:
cloud service models such as software, platform and infrastructure. Service models are types of services
that are required by customers.
Models are based on the kind of operation and requirement of the business. A cloud service can be
replaced with any one of the following as ‘Desktop, data, platform, IT, infrastructure, testing,
computing, security, software, testing, storage, hardware, database, etc
13
_x0000_t75 ...
SaaS:
Provider of SaaS has full administrative rights for its application and responsible for activities such as
deployment, maintenance and update. This type is suitable for customers, who want less management
hassles and worries regarding installation of application, software and its updation.
PaaS:
PaaS is service, where application/software can be build, tested and deployed as a single unit. PaaS is
useful for application builders, developers, deployers and testers.
IaaS:
When the customer requires an end-to-end infrastructure such as computer resources, storages
and network, he/she can opt for IaaS. The usage fee is billed at CPU hour, size (GB) of data
accessed or stored/hour, bandwidth consumed, etc. Figure 4.5 depicts the IaaS component stack
and scope of control.
14
3. Platform as a service
4. Infrastructure as a service
5. Management as a service
_x0000_t75 ...
15
UNIT - II
_x0000_t75 ...
Front End
Back End
Front End
The front end is used by the client. It contains client-side interfaces and applications that are
required to access the cloud computing platforms.
The front end includes web servers (including Chrome, Firefox, internet explorer, etc.), thin &
fat clients, tablets, and mobile devices.
16
Back End
The back end is used by the service provider. It manages all the resources that are required to
provide cloud computing services.
It includes a huge amount of data storage, security mechanism, virtual machines, deploying
models, servers, traffic control mechanisms, etc.
The cloud computing reference model (CC-RM) facilitates the process of modelling cloud
architecture and planning the deployment activities.
It also establishes a foundation for modeling cloud and its architecture, from which an IT
organization can plan, architect, model and deploy to address business and technical challenges.
Cloud is not a problem-solving architecture, it is a collection of services, which can be used to
solve problems. _x0000_t75 ...
2. Cloud deployment model: The cloud deployment model (CDM) describes the various cloud
models such as private, public, hybrid and community clouds.
3.Cloud governance and operations model: The cloud governance and operations model
defines the requirements for cloud computing such as governance, privacy, security
operations,management, support and monitoring.
4. Cloud ecosystem model: The cloud ecosystem takes cares of development and sustenance.It
consists of cloud providers, consumers, intermediaries and networks.
The cloud computing reference model has four sub-models, they are as follows:
1. Cloud virtualization tier: Cloud virtualization tier focuses on the tools that provide
hardware and infrastructure virtualization, computing, storage, network and security
virtualization.
2. Cloud operating system tier: Cloud operating system tier focuses on the technologies that
enable virtualization of resources as cloud-enabled capabilities. Cloud OS tier provides
17
provisioning, billing and metering, load balancing, resource management, monitoring and
management, workfl ow and orchestration of cloud-enabled resources.
3. Cloud platform tier: It focuses on enabling the PaaS oriented services and includes SOAand
Web services concepts.
4. Cloud business tier: Cloud business tier focuses on the various range of business
capabilitiesand business solutions, that are designed and provisioned to consumers as services
via the cloud.
Points to Consider
Multi-datacenter Architecture
18
_x0000_t75 ...
CLOUD COMPUTING TECHNOLOGY:
Phases of CDLC
The different activities and feedback of CDLC in achieving the desired cloud.
In this lifecycle model, feedback is used in which a phase gives the necessary information to
the preferred upper phase. Among these phases, the second, fourth, fi fth and sixth phase give
response to the first phase.
Architect
The structural behaviour of the cloud architecture gives solution to the cloud system which
19
comprises of on-premise resource, cloud resources, cloud services, cloud middleware, software
components, data server location and externally visible properties of data server location.
Implementation:
Events such as privacy, protection, regular, legality, mentality, inter-machine
message and privacy theory are addressed within the implementation phase. Two components
of cloud computing are implemented in this phase. The implementation of file system is the first case.
The file system is the key component of the system to support massive data storage and management.
The implementation of map-reduce system is the second case. This also performs the task of
integrating the different cloud solutions in one cloud environment.
This phase deploys different resources, services and applications to the cloud. This phase also gives
training to the end user so that he/she can accept the new network solution easily.
Integration:
Integration is intermediate between the source and target systems for extracting
data, mediating and publishing it.
In the present economy, businesses and enterprises are shifting to cloud technology due to the low
costs, scalability and independent IT constrained resources.
_x0000_t75 ...
Large organizations integrate into cloud environment with their available systems.
Five possibilities and recommendations for integrating into cloud effectively are as follows:
1. Plan and set realistic goals
2. Learn from other’s experience
3. Require IT specialist team
4. Address security concerns
5. Maximize connectivity options
Quality Assurance and Verification
In this phase, cloud auditing is done to ensure the quality of the cloud network. It also confirms the
performance, reliability, availability, elasticity and safety of cloud network at the service level.
_x0000_t75 ...
● Planning: Enterprise manager helps in creating a cloud set-up with brand new hardware,
new software and even a new data centre.
● Set-up: Enterprise manag er adop ts the IaaS, PaaS and DBaaS model clouds and the various
services offered by these models.
● Building: Packing and publishing of applications are done with the help of the available
cloud computing services.
● Testing and deploying: After building an application, it has to be tested. The testing portfolio
available in enterprise manager does this job. The resultant changes due to the testing are
stored in the database. Testing also estimates the load capacity after deployment.
● Monitoring and managing: It monitors the settings, standards, policies and organizes for
better management.
● Metering, charging and optimization: Usage of resources such as CPU, storage (GB) and
memory are to be metered and charged accordingly.
21
Cloud ecosystems are designed to support various use cases, meet diverse business needs, and
foster innovation within the cloud computing environment.
Benefits of Cloud Ecosystem
Scalability: Cloud services can be very flexible in that they can be rapidly increased or
decreased in response to the amount of current demand which means a business sure does not
have to invest mostly into infrastructure and physical hardware.
Cost Efficiency: Cloud services work on the philosophy of provision of services according to use
hence only charging consumers according to the amount of services consumed. These prevent
the need for excessive initial investments in plants and equipment and also lower running
expenses.
Flexibility and Accessibility: Cloud services are location-independent, allowing for work from
other places that may be near or far from the office. Such flexibility means that businesses can
diversify and extend their operations to target customers in different world regions.
Innovation and Speed: Cloud services allow for the quick and agile creation and delivery of
applications, specifically aiding businesses in delivering new applications to customers at a
quicker pace.
Reliability and Security: Cloud providers dedicate a lot of resources to policies and backups to
guarantee availability and prevent loss of data or hacking insurgence. This helps individual
business entities to have a clean bill of health financially which in turn makes them direct all
their energies to matters which affect their business directly.
Elasticity: The cloud services are capable of...dynamically controlling resources hence providing
_x0000_t75
customers with the best possible experience when demand of given resources is high most
frequently.
Integration and Collaboration: When it comes to integration, cloud services provide a high
level of integration potential where businesses can integrate the cloud services with other
systems and services. This promotes teamwork and allows for efficiency because it allows for a
smooth transition between the various platforms and apps.
Cloud Governance
Cloud governance covers finance, operations, security, compliance, data management, application
performance, asset management, and configurations.
Activities performed as part of implementing cloud governance rules, policies, and processes include
defining, continuously monitoring, and auditing them. This ensures that resources are optimally
allocated, coordinated, and controlled.
Examples of cloud governance rules include:
Defining roles and responsibilities
Determining alert escalation procedures
Enforcing network policies
Ensuring compliance with industry regulations
Establishing and monitoring service level agreements (SLAs)
Implementing disaster recovery policies
Managing data lifecycles
22
Enabling access control requirements
Setting data classification schemes
Specifying allowances for cloud services
Virtualization:
It is a technique, which allows sharing single physical instance of an application or resource
among multiple organizations or tenants (customers). It does this by assigning a logical name to a
physical resource and providing a pointer to that physical resource when demanded.
_x0000_t75 ...
The Multitenant architecture offers virtual isolation among the multiple tenants. Hence, the
organizations can use and customize their application as though they each have their instances running.
Service-Oriented Architecture (SOA)
Service-Oriented Architecture helps to use applications as a service for other
applications regardless the type of vendor, product or technology.
herefore, it is possible to exchange the data between applications of different vendors
without additional programming or making changes to services.
Grid Computing:
It refers to distributed computing, in which a group of computers from multiple
locations are connected with each other to achieve a common objective.
These computer resources are heterogeneous and geographically dispersed.
Grid Computing breaks complex task into smaller pieces, which are distributed to CPUs
that reside within the grid.
Utility Computing:
Utility computing is based on Pay-per-Use model. It offers computational resources on
demand as a metered service.
23
Cloud computing, grid computing, and managed IT services are based on the concept of
utility computing.
Cloud architecture:
Cloud architecture refers to how various cloud technology components, such as hardware,
virtual resources, software capabilities, and virtual network systems interact and connect to
create cloud computing environments.
It acts as a blueprint that defines the best way to strategically combine resources to build a
cloud environment for a specific business need.
Cloud computing is a type of computing environment.Where IT business outsource their
needs.Include software application service to outsside vendors.
Cloud architecture component:
A frontend platform
A Backend platform
A Cloud-based delivery model
A Network (internet, intranet, or intercloud)
In cloud computing, frontend platforms contain the client infrastructure—user interfaces, client-
side applications, and the client device or network that enables users to interact with and access cloud
computing services. _x0000_t75 ...
For example, you can open the web browser on your mobile phone and edit a Google Doc. All
three of these things describe frontend cloud architecture components. On the other hand, the back end
refers to the cloud architecture components that make up the cloud itself, including computing
resources, storage, security mechanisms, management, and more.
Service: The service is the heart of cloud architecture, taking care of all the tasks being run on a
cloud computing system. It manages which resources you can access, including storage, application
development environments, and web applications.
Runtime cloud: Runtime cloud provides the environment where services are run, acting as an
operating system that handles the execution of service tasks and management. Runtimes use
virtualization technology to create hypervisors that represent all your services, including apps, servers,
storage, and networking.
Storage: The storage component in the back end is where data to operate applications is stored.
While cloud storage options vary by provider, most cloud service providers offer flexible scalable
storage services that are designed to store and manage vast amounts of data in the cloud. Storage may
include hard drives, solid-state drives, or persistent disks in server bays.
24
Infrastructure: Infrastructure is probably the most commonly known component of cloud
architecture. In fact, you might have thought that cloud infrastructure is cloud architecture.
However, cloud infrastructure comprises all the major hardware components that power cloud
services, including the CPU, graphics processing unit (GPU), network devices, and other hardware
components needed for systems to run smoothly.
Infrastructure also refers to all the software needed to run and manage everything. Cloud
architecture, on the other hand, is the plan that dictates how cloud resources and infrastructure are
organized.
Management: Cloud service models require that resources be managed in real time according
to user requirements. It is essential to use management software, also known as middleware, to
coordinate communication between the backend and frontend cloud architecture components and
allocate resources for specific tasks.
Beyond middleware, management software will also include capabilities for usage
monitoring, data integration, application deployment, and disaster recovery.
It’s essential to plan and design data security and network security to provide visibility, prevent
data loss and downtime, and ensure redundancy. This may
_x0000_t75 ... include regular backups, debugging, and
virtual frewalls.
Cloud modeling and design:
Cloud computing is a means to reduce cost and complexity of the IT, and helps to optimize the
workload in hand. Cloud computing uses the infrastructure designed especially to work on the vast
computing services with limited resource.
These benefits will,
Improve government services and citizens’ access.
Transform businesses.
Provide new innovations to consumers.
Create energy savings.
Key Principles of Cloud Computing
Three key principles of cloud computing are abstraction, automation and elasticity.
Abstraction
IT providers are in need of standardizing their IT operations, so optimizing their operation will
be made easy. Cloud computing gives some basic but well-defined services.
Managing the software services is passed onto the developer or user. A well-defined abstraction
layer acts a as grease between clouds and developers or users, which helps to work efficiently
and independent of each other.
25
Infrastructure as a Service (IaaS)
Automation
The developers or users have complete control over their resources, this is said to be automation
in the cloud. There is no human interaction, even from a developer’s or user’s side. In this
environment,
when the user needs more servers, the load balancer intimates the cloud as to the extra numbers
be provided. There is no need to wait for unpacking, connect your machine and install, all will
be done automatically.
This automatic process reduces cost and complexity, and it puts the developer or user in control.
Now the user can reduce his time to market for the next rollout because, he can do it himself, no
intervention of professionals needed or waiting period.
Elasticity
In the early years, people had expensive servers and waited for long time to use the full capacity
of their server. This is a highly inefficient model as most of the time the server was
underutilized.
In the dot-com era, people started scaling horizontally, which allowed them to add capacity
according to their needs.
Using elasticity, people can easily scale up and down according to their daily usage.
IBM Power Systems is in an ideal example for cloud environments. Workload optimization:
_x0000_t75 ...
The core capability of cloud computing is optimizing of workload.
This allows the users to make the most of their IT resources while increasing the overall
flexibility.
Limitless virtualization
Automated management
Solutions of all kinds
Limitless virtualization:
With PowerVM (available in IBM Power Systems), users can virtualize resources such as
processor, memory and I/O.
Automated management:
Utilizing IBM Systems Director Enterprise for Power Systems, user can manage their physical
and virtual servers in an automated fashion. This helps to reduce total cost of owner (TCO) and
management costs.
Solutions of all kinds:
Irrespective of the shape, the IBM Power Systems gives solution for the size or composition of
the cloud.
Few offerings done by IBM Power Systems are:
– IBM CloudBurst
– IBM WebSphere CloudBurst Appliance
– IBM Smart Business Development and Test Cloud
Virtualization:
26
Foundation:
Definition of virtualization
Adopting virtualization
Types virtualization
Virtualization architecture and software
DEFINITION OF VIRTUALIZATION:
Virtualization is a methodology for dividing the computer resources to more than one execution
environment by applying more concepts like partitioning, time-sharing, machine simulation and
emulation.’
Virtualization can be expressed as a brand new trend in IT, which includes autonomic
computing and utility computing. This new trend helps the IT environment to manage itself and
every available resource is seen as a utility, where a client pays per use.
A virtual infrastructure consists of the following components:
hyper visors,
virtual infrastructure services and
automated solutions tooptimize IT process.
We can exploit this new trend to increase the number of logicaloperating systems in a single
host, which in turn reduces the hardware acquisition and maintenance cost for an organization.
ADOPTING VIRTUALIZATION:
Virtualization is a perfect solution for small to medium-scale enterprises. It does not suit high
performance applications and should be avoided. It may be possible to add overheads, complexityand
reduce the performance.
In virtualization, the IT industry has a high CPU utilization number indicating optimum usage
of hardware; and based on this number one should not come to the conclusion about the application
usage.
27
TYPES OF VIRTUALIZATION:
Server virtualization
Network Virtualization
Storage virtualization
Desktop virtualization
Application virtualization
Management virtualization
Virtualization is a very powerful tool that drives signifi cant benefits for cost, agility and the
environment. Today virtualization is applied in many places—server virtualization, client/
desktop/application virtualization, storage virtualization and service/application infrastructure
virtualization.
_x0000_t75 ...
Server virtualization:
It is a kind of virtualization, used for masking of server resources, which
includes number of physical servers, processors and operating systems.
The intention of using this method is to spare the complicated server resources and hence
increasing thesharing, utilization and maintaining the capacity of servers.
Network Virtualization:
It is a method where network resources are combine based on available
bandwidth. Each channel is assigned to a particular server.
By adopting this method ofvirtualization, a true complexity of network is hidden and managed
like partitioning thehard drive. Because of network virtualization, lower TCO, higher return of
investment,security and dynamic computing are obtained.
Storage virtualization:
It is a type of virtualization, where a pool of physical storage from
28
different network of storage devices appears as a single storage device. Usually this
kind of virtualization is adopted in SAN (storage area networks).
Storage virtualizationis advantageous in disaster recovery, business continuity, lower TCO,
higher return ofinvestment, dynamic computing, security, testing and development.
Desktop virtualization:
It supports various computing such as utility and dynamism, testing,
development and security.
Application virtualization:
It allows server consolidation, application and desktop deployment, and business continuity.
Apart from this, recovery when disaster, lower TCO withhigher ROI, dynamic computing, testing and
development are possible.
Management virtualization
It allows variety of features which are as follows: server consolidation, centralized policy-based
management, business continuity and disaster recovery, lowerTCO with higher ROI, utility and
dynamic computing, testing and development and security.
SERVER VIRTUALIZATION
Server Virtualization is the process of dividing a physical server into several virtual servers,
called virtual private servers. Each virtual private server can run independently.
The concept of Server Virtualization widely used in the IT infrastructure to minimizes the costs
_x0000_t75 ...
by increasing the utilization of existing resources.
Types of Server Virtualization
1. Hypervisor
In the Server Virtualization, Hypervisor plays an important role. It is a layer between
the operating system (OS) and hardware. There are two types of hypervisors.
Type 1 hypervisor ( also known as bare metal or native hypervisors)
Type 2 hypervisor ( also known as hosted or Embedded hypervisors)
2.Full Virtualization
Full Virtualization uses a hypervisor to directly communicate with the CPU and physical server.
It provides the best isolation and security mechanism to the virtual machines.
The biggest disadvantage of using hypervisor in full virtualization is that a hypervisor has its
own processing needs, so it can slow down the application and server performance.
VMWare ESX server is the best example of full virtualization.
3. Para Virtualization
Para Virtualization is quite similar to the Full Virtualization. The advantage of using this
virtualization is that it is easier to use, Enhanced performance, and does not require
emulation overhead. Xen primarily and UML use the Para Virtualization.
The difference between full and pare virtualization is that, in para virtualization hypervisor
does not need too much processing power to manage the OS.
29
Operating system virtualization is also called as system-lever virtualization. It is a server
virtualization technology that divides one operating system into multiple isolated user-space
called virtual environments.
The biggest advantage of using server visualization is that it reduces the use of physical space,
so it will save money.
6. Kernel-Level Virtualization
Kernel-level virtualization is one of the most important types of server virtualization. It is
an open-source virtualization which uses the Linux kernel as a hypervisor. The advantage of
using kernel virtualization is that it does not require any special administrative software and
has very less overhead.
User Mode Linux (UML) and Kernel-based virtual machine are some examples of kernel
virtualization.
_x0000_t75 ...
Network Virtualization
Network virtualization as such, is an entirely new way of networking compared to a traditional
way of networking, introducing new methods that are more efficient, scalable, and flexible in
the deployment of network resources.
In this article, we will discuss types of network virtualization, the benefits of network
virtualization, and more.
30
Functions of Network Virtualization
Network virtualization is done through the abstraction of networking resources from the underlying physical
infrastructure and the creation of a virtual layer that runs autonomously. Here are key points on how network
virtualization functions:
Abstraction: Network virtualization decouples the physical devices, such as switches, routers, and firewalls,
into software-defined entities, referred to as virtual network devices.
Hypervisor or Controller: The hypervisor or a network controller is central to this. It handles the network
virtualization and manages the virtualized network, including the creation, configuration, and monitoring of
virtual network components.
Virtual Switching: Virtual switches are used to control the network traffic within the virtualized network.
They are software-controlled and provide communication between virtual machines and other virtualized
resources.
Isolation: Virtual networks uses isolation mechanisms to create a network, each virtual network operating
separately. Thus, it ensures privacy and improves security.
Overlay Networks: Overlay networks are frequently employed with a view to building logical connections
on top of the physical infrastructure. This is achieved by encapsulating and tunneling the data from virtual
devices, thus, a virtual network is created on top of the physical one.
Storage Virtualization
Storage virtualization is functional RAID levels and controllers are made desirable, which is an
important component of storage servers.
Applications and operating systems on the device can directly access the discs for writing. Local
storage is configured by the controllers in RAID groups, and the operating system sees the
storage based on the configuration.
_x0000_t75
The controller, however, is in charge ...
of figuring out how to write or retrieve the data that the
operating system requests because the storage is abstracted.
31
VIRTUALIZATION ARCHITECTURE AND SOFTWARE:
_x0000_t75 ...
The Virtualization Architecture MultiNet Protocol Driver (MPD) is used to implement
virtualization of wireless adapter and placed as an intermediate layer between MAC and IP.
The explains how MPD can be used to share a wireless network adaptor and its MAC. MPD sits
in between IP layer and physical layer (MAC). When an application wants to use more than one
network than using TCP/IP, the path is sent to MPD, which is responsible for switching and allocating
the network and appropriate MAC address.
MPD exposes the wireless LAN media adapter as always active. IP stack checks the adapters,
whether they are active always, even though only one is connected at a given time. Switching and
buffering of packets across networks is done by MPD.
32
GRID, CLOUD AND VIRTUALIZATION:
Virtualization in grid
Virtualization in cloud
Virtualization and cloud security
Virtualization is a core technique for many applications in the computing systems. In the
mainframe days itself, virtualization concept was used, but only in the recent years it has come
under lime light.
Adopting virtualization makes us real grid computing with more flexible in applications and the
resources usage.
VIRTUALIZATION IN GRID:
Grid Computing:
The main focal point in grid computing lies in secure resource sharing in accessing
computers,software and data in a dynamic atmosphere. Sharing of those resources has to be fine-tuned
andhandled in a highly controlled manner.
Moreover, Faster projected the following three points to describe a grid more in detail:
1. Nontrivial qualities of service delivery
2. Habit of using standards in all places
3. Resources coordination _x0000_t75 ...
Grid Computing and Virtualization:
Virtualization is not a solution for enterprises to manage their resources although it
providesricher capabilities in managing and moving the OS in different hardware. It helps to run
multiple workloads in a single machine with clear distinction between them. Virtualization can do
suspending, resuming and migrating images in run-time.
Like grid, virtualization is also a trend. Instead of having more hardwares to meet peakdemands,
organizations can use virtualization approaches to get better utilization out of the
existing hardwares which are not fully utilized. Also virtualization is possibly becoming a
mainstreamapproach in managing network resources.
Using Virtualization in Grid Computing:
Virtualization integration and grid computing can be encouraged at various levels.
Grid Computing Level:
The gLite Middleware has strong dependencies to Scientific Linux as operating system
which is used by the LHC (Large Hadron Collider) Computing Grid High Energy Physics Virtual
Organizations (VO). Making gLite to work with other operating systems is not a easy task.
Resource providers can support the VOs with minimal effort by encapsulating the
GridMiddleware into a virtual appliance. The only requirement is support of a virtualization platform
like XEN or VMware. Grid Middlewares can be packaged as virtual appliances similarto the gLite
Middleware. Then resource providers no longer want to consign to a designatedgrid middleware, but
can setup middlewares on demand.
User-based dynamic deployment of themiddleware services is the most preferable approach.
This makes the resource providers’ interference in the deployment of process and he no longer has to
deal with software administrationand application requirements.
33
VIRTUALIZATION IN CLOUD
Virtualization is a tool for system administrators, which has many technical uses than a cloud.
Virtualization allows IT organizations to perform multiple operations using a single physical
hardware. Multiple OS instances running on single device is cost-effective than multiple servers for
each task.
Cloud computing is accessed through the WWW and takes advantage of virtualization.
Cloud computing can also be used without virtualization. Cloud computing and virtualization will
modernize IT organizations. By combining them,companies can run their applications without the need
of running updates and backups, as theyall will be done by the provider.
Virtualization and cloud computing can go hand in hand. Virtualizing everything started a year
ago when processing power, software and servers are virtualized. Now-a-days virtualization means
cloud computing. Cloud computing refers to IT organizations using remote servers for storing data and
accessing information from anywhere. This is done in three ways—public cloud, private cloud and
hybrid cloud
Hyper cloud where dynamic sharing and self-service application provisioning are done. Cloud
foundations where cloud environments, deployments ways, load balancing are done.
Cloud Stack:
Infrastructure stack for delivering web applications by the providers of cloud computing. The
managed cloud stack consisting of two parts:
First part consists of cache,dynamic code and attached storage and logic for the dynamic code;
Second part consists of stable and efficient OS, security features and business logic written
using some programming language.
Cloud computing environment separates the computing environment away from the
developersand helps them focus on improving their application.Every cloud platform includes a virtual
machine language and a gateway for web services.Language functions are closely linked with parent
OS and their native libraries are taken away.
34
Virtual Infrastructures
In the present scenario, the Internet provides services such as research, mining, e-mail and
maps.In the near future, it will converge communication and computation as a single service.
Hence the Internet cannot be considered as a huge shared and unreliable communication
enabling data exchanges between users.
Instead, it will become a pool of interconnected resourcesthat can be shared.Grid’5000, an
experimental facility, gathers clusters and gives access to nearly 5,000 CPUsdistributed over remote
sites and inter-connected by super fast networks.Virtualization abstracts services and physical
resources. It simplifi es the job of managingthe resources and offers a great fl exibility in resource
usage.
The vitrual machine,
● Provides an environment where non-trusted applications can be run
● Adopts isolation techniques
● Allows dynamic deployment of application (portability)
● Applied optimization in OS
● Manages as a single service
CPU VIRTUALIZATION:
Virtualizing a CPU is an easy job. For virtualizing a CPU, the following points are to adhered:
● Privileged instructions runs only in privileged...mode.
_x0000_t75
● Control sensitive instructions that tend to change memory mappings, communicating with
other devices.
● Behavior-sensitive instructions that tend to change resource confi guration.
By adopting CPU virtualization, two separate CPUs resemble a single CPU, i.e., two systems
running in a single system. By adopting this concept, user can run two OS in a singlesystem. The most
important part of the computer is the central processing unit(CPU). The main objective of CPU
virtualization is to make a CPU function similar to that of two separate CPUs.
CPU virtualization allows the users to run different operating systems simultaneously. For
example, Apple Mac can be virtualized to run Windows as well.CPU virtualization is not multitasking
or multi-threading. Multitasking is concept of running multiple applications at a time. Multi-threading
is where more than one CPUs can run applications in a way that carries out two actions at the same
time.
UNIT II COMPLETED
35