0% found this document useful (0 votes)
27 views43 pages

Information Technology Department Overview

Uploaded by

farissahuss18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views43 pages

Information Technology Department Overview

Uploaded by

farissahuss18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

INFORMATION TECHNOLOGY

VISION OF THE DEPARTMENT

To be an excellent Department of Information Technology through teaching and


learning Edge Technologies.

MISSION OF THE DEPARTMENT

M1: To teach programming language through experimental learning for improving


logical and critical thinking.

M2: To promote interdisciplinary research for solving social and technological


problems.

M3: To encourage lifelong learning through MOOC Courses.

M4: To protect intellectual proprietary by educating on cyber ethics.


INFORMATION TECHNOLOGY

PROGRAMME EDUCATIONAL OBJECTIVES

Graduates will be able to

PEO1 - To ensure the graduates to be proficient in utilizing the fundamental knowledge of basic
Sciences, Mathematics and Information Technology for the application in various
streams of Engineering and Technology.
PEO2 - To enrich the graduates with the core competencies necessary for applying knowledge
of Computers and Telecommunications equipment to store, retrieve, transmit,
manipulate and analyze data in the context of business enterprise.
PEO3 - To enable the graduates to improve logical thinking, pursue lifelong learning and
understand technical issues related to computing systems and optimal design solutions.
PEO4 - To enable the graduates in gaining employment in industry and stabilize themselves as
competent professionals in applying their technical skills in real time problems and
meet the diversified needs of industry, academia and research.

PROGRAM SPECIFIC OUTCOMES

To ensure graduates

PSO1 - Have proficiency in programming skills to design, develop and apply appropriate
techniques, to solve complex engineering problems.

PSO2 - Have knowledge to build, automate and manage business solutions using cutting edge
technologies and research in applied computer Technologies
DEPARTMENT OF INFORMATION TECHNOLOGY

PROGRAMME OUTCOMES (POs)

PO1- Engineering knowledge: Apply the knowledge of mathematics, science, engineering


fundamentals, and an engineering specialization to the solution of complex engineering
problems.

PO2 - Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of mathematics,
natural sciences, and engineering sciences.

PO3 - Design/development of solutions: Design solutions for complex engineering problems and
design system components or processes that meet the specified needs with appropriate
consideration for the public health and safety, and the cultural, societal, and environmental
considerations.

PO4 - Conduct investigations of complex problems: Use research-based knowledge and


research methods including design of experiments, analysis and interpretation of data, and
synthesis of the information to provide valid conclusions.

PO5 - Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modeling to complex engineering activities
with an understanding of the limitations.

PO6 - The engineer and society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to
the professional engineering practice.

PO7 - Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and need
for sustainable development.

PO8 - Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.

PO9 - Individual and team work: Function effectively as an individual, and as a member or leader
in diverse teams, and in multidisciplinary settings.

PO10 - Communication: Communicate effectively on complex engineering activities with the


engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and receive
clear instructions.

PO11 - Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments

PO12 - Life-long learning: Recognize the need for, and have the preparation and ability to engage
in independent and life-long learning in the broadest context of technological change.
CCS372 VIRTUALIZATION

COURSE OBJECTIVES:
To learn the basics and types of Virtualization
To understand the Hypervisors and its types
To Explore the Virtualization Solutions
To Experiment the virtualization platforms

LIST OF EXPERIMENTS:
1. Install Guest OS on that VMWARE
2. a)Shrink and extend virtual disk
b)Create, Manage, Configure and schedule snapshots
c)Create Spanned, Mirrored and Striped volume
d)Create RAID 5 volume
3. a)Desktop Virtualization using VNC
b)Desktop Virtualization using Chrome Remote Desktop
4. Create type 2 virtualization on ESXI 6.5 server
5. Create a VLAN in CISCO packet tracer
6. Install KVM in Linux
7. Create Nested Virtual Machine(VM under another VM)

ADDITIONAL EXPERIMENT:
Open Nebula-Private Cloud

COURSE OUTCOMES:
CO1: Analyse the virtualization concepts and Hypervisor
CO2: Apply the Virtualization for real-world applications
CO3: Install & Configure the different VM platforms
CO4: Experiment with the VM with various software
Ex.1: Create type 2 virtualization in VMWARE or any equivalent Open Source Tool.
Allocate memory and storage space as per requirement. Install Guest OS on thatVMWARE

Aim:

Procedure:

Step 1: Download and Install VMware Workstation Player

Step 2: Create a New Virtual Machine

Open VMware Workstation Player

Click on "Create a New Virtual Machine" or go to File > New Virtual Machine

Step 3: Virtual Machine Configuration Wizard

The Virtual machine configuration Wizard will appear. Choose “Typical”


configuration and click “Next”

2
Step 4: Install Guest Operating System

• Choose the installation method for the guest OS. You can either install from a disc
or image file (ISO) or choose to install later. If you have the ISO file for your
guest OS, select it during this step
• Click “Next”

Step 5: Enter Guest OS Details

• Enter the name of your virtual machine and choose the location where you want to
save it.
• Select the appropriate guest operating system and version. For example, if you are
installing Windows 10, choose "Windows" as the guest OS and "Windows 10 x64" as
the version.
• Click "Next."

3
Step 6: Configure Virtual Machine Hardware

• Allocate memory: Choose how much RAM you want to allocate to the virtual
machine. Make sure to leave enough memory for your host OS to run smoothly as
well.
• Allocate storage: Choose whether to store the virtual disk as a single file or split into
multiple files. Specify the disk size, and you can also choose to allocate all disk space
now or let it grow as needed.
• Click "Next."
Step 8: Customize Hardware (Optional)

• If needed, you can customize the virtual machine's hardware settings like CPU cores,
network adapters, graphics memory, etc. Otherwise, you can leave them as default.
• Click "Finish" once you are satisfied with the settings.
Step 8: Install Guest OS

• Start the virtual machine you just created. The virtual machine will boot from the ISO
or installation media you provided earlier.
• Follow the standard installation process for your guest OS.
Step 9: Install VMware Tools (Optional but Recommended)

• After installin/ g the guest OS, it is advisable to install VMware Tools within the
guest OS. VMware Tools provides better integration between the host and guest OS,
enabling features like shared folders, improved graphics, and more.
In the same way, we can install windows OS also. The output screens for the virtual machines
of different configurations.

OUTPUT:

(i)Ubuntu Operating System in Virtual Machine

4
(ii)Windows7 Operating System in Virtual Machine

RESULT:

5
Ex 2(a): Shrink and Extend Virtual Disk

Aim:

Procedure:

Shrink a Virtual Disk:

Step1: Inside the virtual machine, delete unnecessary files and empty the recycle bin/trash to
free up space.

Step 2: Defragment the virtual machine's disk to move all the data to the beginning of the
disk.

Step 3: Shutdown the virtual machine.

Step 4: On the host system, open the virtualization software

Step 5: Navigate to the virtual machine's settings or configuration.

Step 6: Select the virtual disk you want to shrink.

Step 7: Look for an option to shrink or compact the disk and follow the prompts.

Step 8: The process might take some time, and it's essential to back up your virtual machine
before proceeding, as data loss can occur in some cases.

Extend Virtual Disk:

Step 1: Shutdown the virtual machine.

Step 2: On the host system, open the virtualization software (e.g., VMware, VirtualBox).

Step 3: Navigate to the virtual machine's settings or configuration.

Step 4: Select the virtual disk you want to extend.

Step 5: Look for an option to increase or extend the disk and follow the prompts.

Step 6: Specify the new size for the virtual disk (make sure to allocate enough space for your
needs).

Step 7: The process might take some time, and it's crucial to back up your virtual machine
before proceeding, as extending the disk involves modifying the underlying file system.

Output:

6
7
8
Result:

9
Ex 2(b): Create, Manage, Configure and schedule snapshots

Aim:

Procedure:

Step 1: Creating a Snapshot: To create a snapshot, follow these steps:

a. Select the virtual machine in the management interface (e.g., vSphere Client).

b. Right-click on the virtual machine and choose "Snapshot" or "Take Snapshot."

c. Provide a name and description for the snapshot.

d. Optionally, select the memory state to capture the virtual machine's running state
(requires the virtual machine to be powered off).

e. Click "OK" to create the snapshot.

Step 2: Managing Snapshots: Managing snapshots involves tasks such as viewing, reverting,
deleting, and consolidating snapshots.

a. Viewing Snapshots: To see the list of snapshots for a virtual machine, navigate to
the "Snapshots" tab in the virtual machine's details.

b. Reverting to a Snapshot: To revert a virtual machine to a specific snapshot, right-


click on the snapshot and choose "Revert to Snapshot." This action will roll back the virtual
machine to the state captured in the selected snapshot.

c. Deleting Snapshots: To delete a snapshot, right-click on the snapshot and choose


"Delete Snapshot." You can choose to delete the snapshot only or delete the snapshot and
consolidate its changes into the base virtual machine disk.

d. Consolidating Snapshots: If you have multiple snapshots, you can perform a


"Snapshot Consolidation" to merge all snapshots into the base disk. This helps to reduce
storage requirements and improves performance.

Step 3: Configuring Snapshot Settings: The snapshot settings allow you to define how
snapshots are managed and stored.

a. Snapshot Location: Configure the location where snapshot files are stored, which
can be on the same data store as the virtual machine or on a different storage location.

10
b. Snapshot Quiescent: Enable or disable the use of VMware Tools to quiesce the file
system inside the virtual machine before taking a snapshot. This helps ensure application
consistency during the snapshot.

Step 4: Scheduling Snapshots: Some virtualization platforms allow you to schedule


snapshots to be taken automatically at specific intervals.

a. Scheduled Snapshots: Navigate to the virtual machine's settings, find the


"Snapshot Schedule" option, and configure the frequency and retention
policy for automatic snapshots.
Output:

11
Result:

12
Ex.3(a)Create Spanned, Mirrored and Striped volume

Aim:

Procedure:

Step 1: How to create a spanned volume:

a. Right-click on "This PC" or "My Computer" and select "Manage."

b. In the Computer Management window, click on "Disk Management" under


"Storage" in the left pane.

c. Identify the disks you want to use in the spanned volume. They should be
unallocated or have empty space available.

d. Right-click on the first disk and choose "New Spanned Volume."

e. Follow the on-screen instructions to select additional disks and allocate space for
the spanned volume.

f. Assign a drive letter or mount point to the new volume and format it with a file
system.

Step 2: How to create a mirrored volume:

a. Follow steps a to c from the spanned volume creation process to open Disk
Management.

b. Right-click on one of the disks you want to use in the mirror and choose "New
Mirrored Volume."

c. Select the additional disk(s) to mirror the first disk, and then allocate space for the
mirrored volume.

d. Assign a drive letter or mount point to the new volume and format it with a file
system. e. Windows will start the synchronization process, where data is copied from the
source disk to the mirror disk(s).

Step 3: How to create a striped volume:

a. Follow steps a to c from the spanned volume creation process to open Disk
Management.

b. Right-click on one of the disks you want to use in the stripe and choose "New
Striped Volume."

13
c. Select the additional disk(s) to include in the stripe, and then allocate space for the
striped volume. d. Assign a drive letter or mount point to the new volume and format it with a
file system.

Output:

Result:

14
Ex.3(b): Create RAID 5 Volume:

Aim:

Procedure:

Step 1: Backup Data: Before creating the RAID 5 volume, back up all your critical data to
ensure it is safe in case of any unforeseen issues.

Step 2: Initialize and Convert Disks to Dynamic: If your disks are currently basic disks, you
need to convert them to dynamic disks to create a RAID 5 volume. Follow these steps:

a. Right-click on "This PC" or "My Computer" and select "Manage."

b. In the Computer Management window, click on "Disk Management" under


"Storage" in the left pane.

c. Identify the disks you want to use in the RAID 5 array. They should be unallocated
or have empty space available.

d. Right-click on each disk and select "Convert to Dynamic Disk." Repeat this for all
the disks you want to include in the RAID 5 array.

Step 3: Create the RAID 5 Volume: Once you have converted the disks to dynamic, you can
proceed to create the RAID 5 volume:

a. Right-click on one of the disks you want to use in the RAID 5 array.

b. Select "New Spanned Volume."

c. Follow the on-screen instructions to select the other disks you want to include in
the RAID 5 array. There should be at least three disks in total.

d. Allocate the desired amount of space for the RAID 5 volume. RAID 5 requires a
minimum of three disks, and the volume size will be the total capacity of all disks minus one
disk's worth of space. For example, if you have three 1TB disks, the RAID 5 volume will
have a total capacity of 2TB.

e. Assign a drive letter or mount point to the new RAID 5 volume and format it with a
file system.

Step 4: Initialize and Format the RAID 5 Volume: After creating the RAID 5 volume, you
need to initialize and format it:

a. When prompted, initialize the disks using the default partition style (usually GPT).

15
b. Format the RAID 5 volume with your desired file system (e.g., NTFS) and assign a
drive letter or mount point.

Output:

Result:

16
Ex.4(a): Desktop Virtualization using VNC

Aim:

Procedure:

Step 1: Install VNC Server.

Step 2: Configure VNC Server: After installing the VNC server, you'll need to configure it
by setting a password or access control options to secure the remote access. Ensure that the
VNC server is running and ready to accept incoming connections.

Step 3: Install VNC Viewer.

Step 4: Connect to the Remote Desktop: Launch the VNC viewer and enter the IP address or
host name of the remote computer (the host) you want to connect to. If you have configured a
password or access control options on the VNC server, you will be prompted to enter the
credentials. Once authenticated, the VNC viewer establishes a connection to the remote
desktop.

Step 5: Control the Remote Desktop: After the connection is established, you will see the
remote desktop environment displayed in the VNC viewer. You can now interact with the
remote desktop as if you were physically sitting in front of it. You can run applications,
access files, and perform any tasks on the remote computer just as if you were using it
directly.

Output:

17
Result:

18
Ex.4(b) Desktop Virtualization using Chrome Remote Desktop

Aim:

Procedure:

Step 1: Install Chrome Remote Desktop Extension: Make sure you have the Google Chrome
web browser installed on both the computer you want to access remotely (the host) and the
computer or device you want to use for remote access (the client). Install the "Chrome
Remote Desktop" extension from the Chrome Web Store on both devices.

Step 2: Set Up Host Computer (Computer to be Accessed):

a. Open Google Chrome on the host computer.

b. In the address bar, type "chrome://apps" and press Enter.

c. Click on the "Chrome Remote Desktop" icon to open the application.

d. Follow the on-screen instructions to grant necessary permissions and set up remote
access for the host computer.

e. Create a secure PIN to use for remote access authentication.

Step 3: Access Host Computer (Client Device):

a. Open Google Chrome on the client device (the computer or device from which you
want to access the host computer remotely).

b. In the address bar, type "[Link]/access" and press Enter.

c. Click on the "Access" button under the "Remote Access" section.

d. Sign in with your Google Account (the same account used on the host computer).

Step 4: Choose the Host Computer:

a. After signing in, you should see a list of available computers set up for remote
access. Choose the host computer you want to access.

Step 5: Authenticate and Connect:

a. If you have set up a PIN for the host computer, you will be prompted to enter it to
authenticate the remote access.

b. Once authenticated, the remote connection will be established, and you will
see the host computer's desktop in the Chrome browser window.

19
Step 6: Control the Host Computer:

a. You can now interact with the host computer's desktop through the Chrome
browser on your client device. Use your mouse and keyboard to control the remote desktop.

b. To switch between full-screen and windowed mode, click the "Toggle full screen"
button on the top right corner of the remote desktop window.

Step 7: End the Remote Session: To end the remote session, click the "Stop Sharing" button
at the bottom of the remote desktop window.

Output:

Result:

20
Ex.5 Create type 2 virtualization on ESXI 6.5 server

Aim:

Procedure:

Step 1: Install ESXi 6.5: First, you need to install VMware ESXi 6.5 on your server.

Step 2: Access ESXi Web Client: Once ESXi is installed and running, access the ESXi Web
Client through a web browser on a separate computer. Enter the IP address or hostname of
your ESXi server to log in to the management interface.

Step 3: Create a Virtual Machine: To create a virtual machine within ESXi, follow these
steps:

a. In the ESXi Web Client, navigate to the "Hosts and Clusters" view.

b. Select your ESXi server from the list of hosts.

c. Click on the "Create/Register VM" button or right-click on the host and choose
"New Virtual Machine."

d. The "Create New Virtual Machine" wizard will appear. Follow the steps in the
wizard to configure the virtual machine, including providing a name, selecting the guest
operating system, setting the desired resources (CPU, memory, disk space, etc.), and selecting
a storage location for the virtual machine files.

e. Finish the wizard, and the virtual machine will be created.

Step 4: Install Guest Operating System: Once the virtual machine is created, you can power it
on and install the guest operating system of your choice (e.g., Windows, Linux, etc.) using an
ISO image or CD/DVD.

Step 5: Access and Manage the Virtual Machine: After the guest operating system is
installed, you can access the virtual machine through the VMware Remote Console (VMRC)
or use remote access tools like VNC or RDP to interact with the guest operating system.

OUTPUT:

21
22
Result:

23
Ex.6: Create a VLAN in CISCO packet tracer

Aim:

Procedure:

Step 1: Launch Cisco Packet Tracer: Start Cisco Packet Tracer and open a new or existing
project.

Step 2: Add Switches: Drag and drop switches from the "Switches" section of the "Devices"
pane onto the workspace. You can use any Cisco switch model available in Packet Tracer.

Step 3: Connect Switches: Connect the switches using Ethernet cables. Click on the Ethernet
interfaces of the switches and then click on the other switch's Ethernet interfaces to create
connections.

Step 4: Access the CLI: Double-click on the first switch to access its CLI (Command Line
Interface). The CLI window will open.

Step 5: Configure VLANs: Enter the configuration mode by typing the following command:

enable

configure terminal

Step 6: Create VLANs: To create VLANs, use the vlan command followed by the VLAN
number. For example, to create VLAN 10 and VLAN 20, you would do:

vlan 10

vlan 20

Step 7: Assign Ports to VLANs: To assign ports to VLANs, use the

interface command followed by the port number and then the switchport access vlan
command. For example, to assign port 1 to VLAN 10 and port 2 to VLAN 20, you would do:

interface FastEthernet0/1

switchport mode access

switchport access vlan 10

interface FastEthernet0/2

switchport mode access

24
switchport access vlan 20

Step 8: Exit Configuration Mode: After assigning VLANs to the desired ports, exit the
configuration mode by typing exit.

Step 9: Save Configuration: Save the configuration by typing write or copy running-config
startup-config to make sure the changes are saved.

Step 10: Test VLANs: Now that you have created VLANs and assigned ports, you can test
the connectivity between devices connected to the switches. Devices in the same VLAN
should be able to communicate with each other, while devices in different VLANs should not
have direct communication unless you configure inter-VLAN routing.

Output:

25
Result:

26
Ex.7. Install KVM in Linux

Aim:

Procedure:

Step 1: Check Hardware Support: Before installing KVM, ensure that your system's CPU
supports hardware virtualization extensions (Intel VT-x or AMD-V). You can check this by
running the following command:

egrep -c '(vmx|svm)' /proc/cpuinfo

If the output is greater than zero (1 or more), it means your CPU supports hardware
virtualization.

Step 2: Install KVM Packages: The package names may vary depending on your Linux
distribution. Here are the package names for some popular distributions:

For Ubuntu/Debian:

sudo apt update

sudo apt install qemu-kvm libvirt-daemon-system libvirt-clients bridge-utils virt-


manager

For CentOS/RHEL:

sudo yum install qemu-kvm libvirt virt-install bridge-utils

sudo systemctl enable libvirtd

sudo systemctl start libvirtd

For Fedora:

sudo dnf install @virtualization

sudo systemctl enable libvirtd

sudo systemctl start libvirtd

Step 3: Verify Installation: After installing the required packages, check if KVM kernel
modules are loaded correctly:

lsmod | grep kvm

The output should show kvm and kvm_intel or kvm_amd modules loaded, depending on
your CPU.

27
Step 4: Configure Permissions: For non-root users to manage virtual machines using KVM,
add them to the libvirt group:

sudo usermod -aG libvirt <username>

Remember to log out and log back in for the changes to take effect.

Step 5: Enable Nested Virtualization (Optional): If you plan to run virtual machines with
nested virtualization (e.g., running KVM inside a KVM guest), you may need to enable
nested virtualization on the host. This step is only required if you intend to run virtual
machines with KVM as guests.

For Intel CPUs:

echo "options kvm-intel nested=1" | sudo tee /etc/modprobe.d/[Link]

sudo modprobe -r kvm_intel

sudo modprobe kvm_intel

For AMD CPUs:

echo "options kvm-amd nested=1" | sudo tee /etc/modprobe.d/[Link]

sudo modprobe -r kvm_amd

sudo modprobe kvm_amd

Step 6: Install and Configure Virt-Manager (Optional): Virt-Manager is a graphical user


interface tool to manage virtual machines using KVM. If you prefer a GUI interface, you can
install Virt-Manager:

For Ubuntu/Debian:

sudo apt install virt-manager

For CentOS/RHEL:

sudo yum install virt-manager

For Fedora:

sudo dnf install virt-manager

Once the installation is complete, you can start creating and managing virtual machines using
KVM. You can use command-line tools like virsh or a graphical interface like Virt-Manager
to interact with KVM.

Output:

28
Result:

29
Ex.8: Create Nested Virtual Machine(VM under another VM)

Aim:

Procedure:

Step 1: Enable Nested Virtualization: Before creating a nested VM, ensure nested
virtualization is enabled on the host VM (the VM that will run other VMs).

For VirtualBox:

Open VirtualBox and select the host VM from the list. Go to "Settings" > "System" >
"Processor" and check the "Enable Nested VT-x/AMD-V" option.

Step 2: Install an Operating System in the Host VM: Ensure you have an operating system
installed in the host VM. This will be the environment in which you'll run the nested VMs.

Step 3: Install VirtualBox within the Host VM: Inside the host VM, download and install
VirtualBox (or any other virtualization software you prefer) as if you were installing it on a
physical machine.

Step 4: Create the Nested VM: Now that you have VirtualBox installed within the host VM,
you can create a new VM inside it.

a. Open VirtualBox within the host VM.

b. Click on "New" to create a new VM.

c. Follow the VM creation wizard to set up the nested VM, including selecting the
guest operating system, allocating memory, creating a virtual hard disk, etc.

Step 4: Install the Guest Operating System in the Nested VM: With the nested VM created,
start it and install the guest operating system, just as you would with any regular VM
installation.

Step 5; Configure Networking (Optional): Depending on your requirements, you may need to
configure the networking of the nested VM to allow communication with other VMs or
external networks.

Step 6: Use the Nested VM: Once the nested VM is set up and the guest operating system is
installed, you can use it just like any other VM. Install applications, run tests, or perform any
tasks within the nested VM.

Output:

30
Result

31
CONTENT BEYOND SYLLABUS

OPENNEBULA - PRIVATE CLOUD SETUP

AIM:

PROCEDURE:

OpenNebula offers a simple but feature-rich and flexible solution to build and
manage enterprise clouds and virtualized data centers. OpenNebula is designed
to be simple. Simple to install, update and operate by the admins, and simple to
use by end users.

Interfaces Provided by OpenNebula


OpenNebula provides many different interfaces that can be used to interact with the
functionality offered to manage physical and virtual resources. There are four main different
perspectives to interact with OpenNebula:

• Cloud interfaces for Cloud Consumers, like EC2 Query and EBS interfaces, and a
simple Sunstone cloud user view that can be used as a self-service portal.
• Administration interfaces for Cloud Advanced Users and Operators, like a
Unix- like command line interface and the powerful Sunstone GUI.
• Extensible low-level APIs for Cloud Integrators in Ruby, JAVA and XMLRPC API

• A Marketplace for Appliance Builders with a catalog of virtual appliances


ready to run inOpenNebula environments.
OpenNebula Support to Cloud Consumers

• OpenNebula provides a powerful, scalable and secure multi-tenant cloud


platform for fast delivery and elasticity of virtual resources. Multi-tier
applications can be deployed and consumed as pre-configured virtual
appliances from catalogs.
Image Catalogs: OpenNebula allows to store disk images in catalogs (termed
datastores),that can be then used to define VMs or shared with other users. The
images can be OS installations, persistent data sets or empty data blocks that are

32
created witthe datastore.

Network Catalogs: Virtual networks can be also be organised in network


catalogs, and provide means to interconnect virtual machines. This kind of
resources can be defined as IPv4, IPv6, or mixed networks, and can be used to
achieve full isolation between virtual networks.
VM Template Catalog: The template catalog system allows to register virtual
machine definitions in the system, to be instantiated later as virtual machine
instances.
Virtual Resource Control and Monitoring: Once a template is instantiated to a
virtual machine, there are a number of operations that can be performed to control
lifecycle of the virtual machine instances, such as migration (live and cold), stop,
resume, cancel, poweroff, etc.
Multi-tier Cloud Application Control and Monitoring: OpenNebula allows to
define, execute and manage multi-tiered elastic applications, or services composed
of interconnected Virtual Machines with deployment dependencies between them
and auto-
scaling rules
OpenNebula Support to Cloud Consumers

• Users and Groups: OpenNebula features advanced multi-tenancy with powerful users
and groups management, fine-grained ACLs for resource allocation, and resource quota
management to track and limit computing, storage and networking utilization.
• Virtualization: Various hypervisors are supported in the virtualization manager, with the
ability to control the complete lifecycle of Virtual Machines and multiple hypervisors in
the same cloud infrastructure.
• Hosts: The host manager provides complete functionality for the management of the
physical hosts in the cloud.
Monitoring: Virtual resources as well as hosts are periodically monitored for key
performance indicators. The information can then used by a powerful and
flexible scheduler for the definition of workload and resource-aware allocation
policies.
Accounting: A Configurable accounting system to visualize and report resource
usage data, to allow their integration with chargeback and billing platforms, or to
guarantee fair share of resources among users.

33
Networking: An easily adaptable and customizable network subsystem is present
in OpenNebula in order to better integrate with the specific network requirements
of existing data centers and to allow full isolation between virtual machines that
composes a virtualised service.

Storage: The support for multiple datastores in the storage subsystem provides
extreme flexibility in planning the storage backend and important performance
benefits.
Security: This feature is spread across several subsystems: authentication and
authorization mechanisms allowing for various possible mechanisms to identify a
authorize users, a powerful Access Control List mechanism allowing different role
management with fine grain permission granting over any resource managed by
OpenNebula, support for isolation at different levels...
High Availability: Support for HA architectures and configurable behavior in the
event of host or VM failure to provide easy to use and cost-effective failover
solutions.
Clusters: Clusters are pools of hosts that share datastores and virtual networks.
Clusters are used for load balancing, high availability, and high performance
computing.
• Multiple Zones: The Data Center Federation functionality allows for the centralized
management of multiple instances of OpenNebula for scalability, isolation and multiple-
site support.
• VDCs. An OpenNebula instance (or Zone) can be further compartmentalized in Virtual
Data Centers (VDCs), which offer a fully-isolated virtual infrastructure environment
where a group of users, under the control of the group administrator, can create and
manage compute, storage and networking capacity.
• Cloud Bursting: OpenNebula gives support to build a hybrid cloud, an extension of a
private cloud to combine local resources with resources from remote cloud providers.
A

whole public cloud provider can be encapsulated as a local resource to be able to use
extra computational capacity to satisfy peak demands.
App Market: OpenNebula allows the deployment of a private centralized
catalog ofcloud applications to share and distribute virtual appliances across

34
OpenNebula instances
OpenNebula Support to Cloud builders

OpenNebula offers broad support for commodity and enterprise-grade hypervisor,


monitoring,storage, networking and user management services:
User Management: OpenNebula can validate users using its own internal user
database basedon passwords, or external mechanisms, like ssh, x509, ldap or
Active Directory Virtualization: Several hypervisor technologies are fully
supported, like Xen, KVM and VMware.

Monitoring: OpenNebula provides its own customizable and highly


scalable monitoringsystem and also can be integrated with external data
center monitoring tools.
Networking: Virtual networks can be backed up by 802.1Q VLANs,
ebtables, OpenvSwitch or VMware networking.
Storage: Multiple backends are supported like the regular (shared or not) filesystem
datastore supporting popular distributed file systems like NFS, Lustre, GlusterFS,
ZFS, GPFS, MooseFS...; the VMware datastore (both regular filesystem or VMFS
based) specialized for theVMware hypervisor that handle the vmdk format; the
LVM datastore to store disk images in a block device form; and Ceph for
distributed block device.
Databases: Aside from the original sqlite backend, mysql is also supported.

OpenNebula 4.6 Installation on Ubuntu 14.04 and Kernel Virtual


Machine (KVM)Hypervisor

OpenNebula installation using Ubuntu 14.04 as Operating system and KVM as the
hypervisor. The two components are present in it are Frontend and Nodes. The
Frontend server execute the OpenNebula services and the Nodes functionality is to
execute virtual machines. The following steps to execute both components in a
single server. The machine has to support virtualization (i.e.) VT enabled system.
The command to test the virtualization support is as follows
grep -E 'svm|vmx' /proc/cpuinfo

Package Layout

opennebula-common: Provides the user and common files

35
libopennebula-ruby: All ruby libraries

opennebula-node: Prepares a
node as an opennebula-node
opennebula-sunstone:
OpenNebula Sunstone Web
Interface opennebula-tools:
Command Line interface

opennebula-gate: Gate server that enables communication between VMs and


OpenNebula
opennebula-flow: Manages services and elasticity

opennebula: OpenNebula Daemon

Step 1. Installation in the Frontend

1. Add the repository

sudo wget -q -O- [Link] | apt-key add -

sudo echo "deb [Link] stable opennebula"

> /etc/apt/[Link].d/[Link]

2. Install the required packages


sudo apt-get update

sudo apt-get install opennebula opennebula-sunstone nfs-kernel-server

3. Configure and start the services


There are two main processes that must be started, the main
OpenNebula daemon: oned, and thegraphical user interface:
sunstone.

Sunstone listens only in the loopback interface by default for


security reasons. To change it edit /etc/one/[Link]
and

change
:host:
[Link] to

36
:host:
[Link]. The
command
to restart
the
Sunstone:
sudo /etc/init.d/opennebula-sunstone restart

4. Configure Network File Service (NFS) (This is not needed if both


Frontend and Nodes are in the samemachine)
Export /var/lib/one/ from the frontend to the worker nodes. To
do so add the following to the /etc/exports file in the frontend:
/var/lib/one/ *(rw,sync,no_subtree_check,root_squash)

Refresh the NFS export by the following command


sudo service nfs-kernel-server restart

5. Configure SSH public key


sudo su – oneadmin

cp ~/.ssh/id_rsa.pub ~/.ssh/authorized_keys

Add the following snippet to ~/.ssh/config so it doesn’t prompt to add the keys to
$ cat << EOT > ~/.ssh/config
Host *

StrictHostKeyChecking no
UserKnownHostsFile /dev/null

the known_hosts file:.

EOT

$ chmod 600 ~/.ssh/config

Step 2. Installation in the Nodes

1. Install the required packages

sudo apt-get install opennebula-node nfs-common bridge-utils


37
edit /etc/network/interfaces

auto lo

iface lo inet
loopbackauto
br0

iface br0 inet


dhcp
bridge_port
s eth0
bridge_fd 9

bridge_hello 2

Restart the network


sudo /etc/init.d/networking restart

2. Configure NFS (This is not needed if both Frontend and


Nodes are in the same machine) edit the file /etc/fstab as
<Frontend IP>:/var/lib/one/ /var/lib/one/ nfs soft,intr,rsize=8192,wsize=8192,noauto

Mount the NFS

/* if there is any problem , then

3. Configure Qemu
oneadmin user must be able to

Restart libvirt

Step 3: Start the sunstone from the web browser


[Link]

oneadmin password is available in the file ~/.one/one_auth

38
1. From the command line, to login as oneadmin in the Frontend , execute
sudo su - oneadmin

2. Adding Host
To start running VMs, you should first register a worker node for OpenNebula.

onehost create localhost -i kvm -v kvm -n dummy

Run onehost list - Try these command until it's on. If there is any failure, look at
/var/log/one/[Link]

3. Adding Virtual resources


To create networks, create a network template file "[Link]" and edit the
NAME = "private"
TYPE = FIXED
BRIDGE = br0

LEASES = [ IP=[Link] ]
LEASES = [ IP=[Link] ]
LEASES = [ IP=[Link]
file as follows: ]

Create resources in opennebula

$ onevnet create [Link]

$ oneimage create --name "CentOS-6.5_x86_64" \

--path "[Link] \

--driver qcow2 \

--datastore default

$ onetemplate create --name "CentOS-6.5" --cpu 1 --vcpu 1 --memory 512 \

--arch x86_64 --disk "CentOS-6.5_x86_64" --nic "private" --vnc \

--ssh

39
Monitor the resources are created by running the command oneimage list

In order to dynamically add ssh keys to Virtual Machines we must


add our ssh key to the user template, by editing the user template:

$ EDITOR = vi oneuser update oneadmin

Add a new line to the template (cat ~/.ssh/id_dsa.pub)


SSH_PUBLIC_KEY="ssh-dss AAAAB3NzaC1kc3MAAACBANBWTQmm4Gt..."

4. To run a virtual machine


To test, execute onevm list , VM going from Pending to Prolog to Running. If it fails, check
the log as

/var/log/one/<VM_ID>/[Link]

Viva Questions:

1. What is open nebula?


2. How will you create the resource in nebula?
3. What is VDC?
4. What is cluster?
5. Explain cloud bursting.

Result:

40

You might also like