0% found this document useful (0 votes)
196 views179 pages

Cloud Computing

The document outlines the course ECST305-4 on Cloud Computing at Shri Ramdeobaba College of Engineering and Management, detailing the learning objectives and modules covering topics such as cloud models, virtualization, and resource provisioning. It includes a comprehensive overview of computer networks, protocols, and the Internet's structure, emphasizing the interconnected nature of access and global ISPs. The course also provides references to key textbooks and resources for further study in cloud computing and network principles.

Uploaded by

Nikhil Damle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
196 views179 pages

Cloud Computing

The document outlines the course ECST305-4 on Cloud Computing at Shri Ramdeobaba College of Engineering and Management, detailing the learning objectives and modules covering topics such as cloud models, virtualization, and resource provisioning. It includes a comprehensive overview of computer networks, protocols, and the Internet's structure, emphasizing the interconnected nature of access and global ISPs. The course also provides references to key textbooks and resources for further study in cloud computing and network principles.

Uploaded by

Nikhil Damle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Shri Ramdeobaba College of Engineering and Management,

Nagpur

ECST305-4 Cloud Computing

(c) Nikhil Damle


On successful completion of the course, the student will be able to:
1. Understand network as recourse for cloud
2. Articulate the concepts of cloud computing
3. Implement the concept of virtualization and resource management.
4. Demonstrate the measures to be taken for handling fault tolerance and security.
5. Provide cloud computing solutions and recommendations for cloud programming
and software environments-based applications.
Module I: Introduction to computer network Basics, Computing Services, Servers, Data bases,
Networking software, analytics and intelligence, interconnection of peering points, Autonomous
systems.
Module II: Cloud formation ubiquitous, convenient on demand network access of pooled resource
creation, configuration, customization.
Module III: Models of Cloud: Public, Private and Hybrid Clouds, and service models - Infrastructure
as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)methods and
technology used.
Module IV: Cloud virtualization: Hardware /Software /Data servers, Networks infrastructure.
Module V: Service providers and their role infrastructure creation/support, security and
Administration
Module VI: Use cases and resource Provisioning Oracle cloud infrastructure configuration and
management
Text Books
1. Cloud Computing Principles and Paradigm, Rajkumar Buyya, James Broberg, Andrzej Goscinski,
Wiley Publishers.2011
Reference Books
1. Barrie Sosinsky, - Cloud Computing Bible|| John Wiley & Sons, 2010
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, - Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance, O'Reilly 2009
3. Cloud Computing: A Practical Approach, Toby Velte, Anthony TVelte, Robert Elsenpeter,
McGrawHill,2009
Module I: Introduction to computer network Basics, Computing Services, Servers, Data bases,
Networking software, analytics and intelligence, interconnection of peering points, Autonomous
systems.
Module II: Cloud formation ubiquitous, convenient on demand network access of pooled resource
creation, configuration, customization.
Module III: Models of Cloud: Public, Private and Hybrid Clouds, and service models - Infrastructure
as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)methods and
technology used.
Module IV: Cloud virtualization: Hardware /Software /Data servers, Networks infrastructure.
Module V: Service providers and their role infrastructure creation/support, security and
Administration
Module VI: Use cases and resource Provisioning Oracle cloud infrastructure configuration and
management
Text Books
1. Cloud Computing Principles and Paradigm, Rajkumar Buyya, James Broberg, Andrzej Goscinski,
Wiley Publishers.2011
Reference Books
1. Barrie Sosinsky, - Cloud Computing Bible|| John Wiley & Sons, 2010
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, - Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance, O'Reilly 2009
3. Cloud Computing: A Practical Approach, Toby Velte, Anthony TVelte, Robert Elsenpeter,
McGrawHill,2009
our goal: overview:
• what’s the Internet?
• get “feel” and
• what’s a protocol?
terminology
• network edge; hosts, access net,
• more depth, detail physical media
later • network core: packet/circuit
• approach: switching, Internet structure
• use Internet as • performance: loss, delay,
throughput
example
• security
• protocol layers, service models
• history
1.1 what is the Internet?
1.2 network edge
 end systems, access networks, links
1.3 network core
 packet switching, circuit switching,
network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
What’s the Internet: “nuts and
bolts” view
PC • millions of connected mobile network
server
computing devices:
• hosts = end systems
wireless global ISP
• running network apps
laptop
smartphone
home
network
regional ISP
communication
wireless
links
wired
links
links  fiber, copper,
radio,
satellite
 transmission
Packet
router rate: switches: institutional
forward packets
bandwidth
network
(chunks of data)
What’s the Internet: “nuts and bolts”
view
• Internet: “network of mobile network
networks”
• Interconnected ISPs global ISP

• protocols control sending,


receiving of msgs home
network
regional ISP
• e.g., TCP, IP, HTTP, Skype,
802.11
• Internet standards
• RFC: Request for comments
• IETF: Internet Engineering
Task Force institutional
network
What’s the Internet: a service
view
• Infrastructure that provides
services to applications: mobile network
• Web, VoIP, email, games, e-
commerce, social nets, … global ISP
• provides programming
interface to apps home
• hooks that allow sending and network
regional ISP
receiving app programs to
“connect” to Internet
• provides service options,
analogous to postal service

institutional
network
What’s a
protocol?
human protocols: network protocols:
• “what’s the time?” • machines rather than
humans
• “I have a question”
• all communication
• introductions activity in Internet
governed by protocols
… specific msgs sent
protocols define
… specific actions taken format, order of
when msgs received,
or other events msgs sent and
received among
network entities, &
actions taken on
What’s a
protocol?
a human protocol and a computer network protocol:

Hi TCP connection
request
Hi TCP connection
response
Got the
time? Get [Link]
2:00 <file>
time

Q: other human protocols?


A closer look at network
Structure:
• network edge:
• hosts: clients and servers mobile network
• servers often in data centers
global ISP

home
 access networks, network
regional ISP
physical media:
wired, wireless
communication
 links
network core:
 interconnected
routers institutional
network
 network of
networks
Access networks and physical
media
Q: How to connect end
systems to edge router?
• residential access nets
• institutional access
networks (school,
company)
• mobile access networks
keep in mind:
• bandwidth (bits per
second) of access network?
• shared or dedicated?
Access net: digital subscriber line (DSL)

central office telephone


network

DSL splitter
modem DSLA
M
voice, data transmitted ISP
at different frequencies over DSL access
dedicated line to central office multiplexer

 use existing telephone line to central office DSLAM


 data over DSL phone line goes to Internet
 voice over DSL phone line goes to telephone net
 < 2.5 Mbps upstream transmission rate (typically <
1 Mbps)
 < 24 Mbps downstream transmission rate (typically
< 10 Mbps)
Access net: cable
network
cable headend


cable splitter
modem

C
O
V V V V V V
N
I I I I I I D D
T
D D D D D D A A
R
E E E E E E T T
O
O O O O O O A A
1 2 3 4 5 6 7 8 L9

Channels

frequency division multiplexing: different channels transmitted


in different frequency bands
Access net: cable
network
cable headend


cable splitter cable modem
modem CMTS termination system
data, TV transmitted at different
frequencies over shared cable ISP
distribution network

 HFC: hybrid fiber coax


 asymmetric: up to 30Mbps downstream
transmission rate, 2 Mbps upstream
transmission rate
 network of cable, fiber attaches homes to ISP
router
 homes share access network to cable
Access net: home
network
wireless
devices

to/from headend or
central office
often combined
in single box

cable or DSL
modem
wireless router, firewall, NAT
access
point (54 Mbps) wired Ethernet (100
Mbps)
Enterprise access networks (Ethernet)

institutional link to
ISP (Internet)
institutional router
Ethernet institutional mail,
switch web servers

• typically used in companies, universities, etc


 10 Mbps, 100Mbps, 1Gbps, 10Gbps transmission rates
 today, end systems typically connect into Ethernet switch
Wireless access networks
• shared wireless access network connects end system to router
• via base station aka “access point”

wireless LANs: wide-area wireless


 within building (100 access
ft)  provided by telco
 802.11b/g (WiFi): (cellular) operator, 10’s
11, 54 Mbps km
transmission rate  between 1 and 10 Mbps
 3G, 4G: LTE

to Internet

to Internet
Physical media
• bit: propagates between
transmitter/receiver pairs
• physical link: what lies
twisted pair (TP)
between transmitter & • two insulated copper
receiver wires
• guided media: • Category 5: 100 Mbps,
• signals propagate in solid 1 Gpbs Ethernet
media: copper, fiber, coax • Category 6: 10Gbps
• unguided media:
• signals propagate freely,
e.g., radio
Physical media: coax, fiber
coaxial cable: fiber optic cable:
• two concentric copper  glass fiber carrying
conductors light pulses, each
pulse a bit
• bidirectional  high-speed
• broadband: operation:
• multiple channels on  high-speed point-to-
cable point transmission
• HFC (e.g., 10’s-100’s
Gpbs transmission
rate)
 low error rate:
 repeaters spaced far
apart
 immune to
Physical media: radio
• signal carried in radio link types:
electromagnetic  terrestrial microwave
spectrum  e.g. up to 45 Mbps
• no physical “wire” channels
 LAN (e.g., WiFi)
• bidirectional  11Mbps, 54 Mbps
• propagation  wide-area (e.g.,
environment effects: cellular)
• reflection  3G cellular: ~ few
• obstruction by Mbps
objects
 satellite
 Kbps to 45Mbps
• interference channel (or multiple
smaller channels)
 270 msec end-end
The network core
• mesh of interconnected
routers
• packet-switching: hosts
break application-layer
messages into packets
• forward packets from one
router to the next, across
links on path from source
to destination
• each packet transmitted
at full link capacity
Internet structure: network of
networks
 End systems connect to Internet via
access ISPs (Internet Service Providers)
 Residential, company and university
ISPs
 Access ISPs in turn must be
interconnected.
 So that any two hosts can send packets
to each other
 Resulting network of networks is very
complex
 Evolution was driven by economics and
national policies
 Let’s take a stepwise approach to describe
current Internet structure
Internet structure: network of
networks
Question: given millions of access ISPs, how to connect them
together?

access
… access
net
access
net …
net
access
access net
net
access
access net
net


access access
net net

access
net
access
net

access
net
access
… net
access access …
net access net
net
Internet structure: network of
networks
Option: connect each access ISP to every other access ISP?

access
… access
net
access
net …
net
access
access
net
… … net

access
access net
net

connecting each access ISP



to each other directly doesn’t


access access

net
scale: O(N2) connections. net

access
net
access
net

access
net
access


… net
access access …
net access net
net
Internet structure: network of
networks
Option: connect each access ISP to a global
transit ISP? Customer and provider ISPs have
economic agreement.
… access
… access
net
access
net

net
access
access net
net
access
access net
net


global
access
net ISP access
net

access
net
access
net

access
net
access
… net
access access …
net access net
net
Internet structure: network of
networks
But if one global ISP is viable business, there will
be competitors ….

access
… access
net
access
net …
net
access
access net
net
access
access net
net
ISP A


access access
net ISP B net

access
ISP C
net
access
net

access
net
access
… net
access access …
net access net
net
Internet structure: network of
networks
But if one global ISP is viable business, there
will be competitors …. which must be
interconnected Internet exchange point
… access
… access
net
access
net

net
access
access net
net

access
IXP access
net
net
ISP A


access IXP access
net ISP B net

access
ISP C
net
access
net

access
net
peering link
access
… net
access access …
net access net
net
Internet structure: network of
networks
… and regional networks may arise to
connect access nets to ISPS

access
… access
net
access
net …
net
access
access net
net

access
IXP access
net
net
ISP A


access IXP access
net ISP B net

access
ISP C
net
access
net

access
net regional net
access
… net
access access …
net access net
net
Internet structure: network of
networks
… and content provider networks (e.g., Google,
Microsoft, Akamai ) may run their own network,
to bring services, content close to end users
… access
… access
net
access
net

net
access
access net
net

access
IXP access
net
net
ISP A


Content provider network
access IXP access
net ISP B net

access
ISP B
net
access
net

access
net regional net
access
… net
access access …
net access net
net
Internet structure: network of
networks
Tier 1 ISP Tier 1 ISP Google

IXP IXP IXP

Regional ISP Regional ISP

access access access access access access access access


ISP ISP ISP ISP ISP ISP ISP ISP

• at center: small # of well-connected large networks


• “tier-1” commercial ISPs (e.g., Level 3, Sprint, AT&T, NTT), national &
international coverage
• content provider network (e.g, Google): private network that connects it
data centers to Internet, often bypassing tier-1, regional ISPs
Tier-1 ISP: e.g., Sprint
POP: point-of-presence

to/from backbone

peering
… …



to/from customers
Protocol “layers”
Networks are complex,
with many “pieces”:
• hosts Question:
• routers is there any hope of organizing
• links of various structure of network?
media
• applications …. or at least our discussion of
• protocols networks?
• hardware,
software
Organization of air travel

ticket (purchase) ticket (complain)

baggage (check) baggage (claim)

gates (load) gates (unload)

runway takeoff runway landing

airplane routing airplane routing


airplane routing

• a series of steps
Layering of airline
functionality
ticket (purchase) ticket (complain) ticket

baggage (check) baggage (claim baggage

gates (load) gates (unload) gate

runway (takeoff) runway (land) takeoff/landing

airplane routing airplane routing airplane routing airplane routing airplane routing

departure intermediate air-traffic arrival


airport control centers airport

layers: each layer implements a service


• via its own internal-layer actions
• relying on services provided by layer below
Why layering?

dealing with complex systems:


• explicit structure allows identification, relationship
of complex system’s pieces
• layered reference model for discussion
• modularization eases maintenance, updating of
system
• change of implementation of layer’s service transparent
to rest of system
• e.g., change in gate procedure doesn’t affect rest of
system
• layering considered harmful?
Internet protocol stack
• application: supporting network
applications
• FTP, SMTP, HTTP application
• transport: process-process data
transfer transport
• TCP, UDP
• network: routing of datagrams from network
source to destination
• IP, routing protocols link
• link: data transfer between
neighboring network elements physical
• Ethernet, 802.111 (WiFi), PPP
• physical: bits “on the wire”
ISO/OSI reference
model
• presentation: allow applications
to interpret meaning of data, e.g., application
encryption, compression,
presentation
machine-specific conventions
session
• session: synchronization,
checkpointing, recovery of data transport
exchange network
• Internet stack “missing” these link
layers!
• these services, if needed, must be physical
implemented in application
• needed?
source Encapsulatio
message
segment Ht
M
M
application
transport
n
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical

switch

destination Hn Ht M network
M application
Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Network security
• field of network security:
• how bad guys can attack computer networks
• how we can defend networks against attacks
• how to design architectures that are immune to attacks
• Internet not originally designed with (much) security in mind
• original vision: “a group of mutually trusting users attached to a
transparent network” 
• Internet protocol designers playing “catch-up”
• security considerations in all layers!
Internet history
1961-1972: Early packet-switching
principles
• 1961: Kleinrock - queueing • 1972:
theory shows effectiveness • ARPAnet public demo
of packet-switching • NCP (Network Control Protocol)
• 1964: Baran - packet- first host-host protocol
switching in military nets • first e-mail program
• 1967: ARPAnet conceived by • ARPAnet has 15 nodes
Advanced Research Projects
Agency
• 1969: first ARPAnet node
operational
Internet history
1972-1980: Internetworking, new and proprietary
nets
• 1970: ALOHAnet satellite network Cerf and Kahn’s internetworking
in Hawaii principles:
• minimalism, autonomy - no
• 1974: Cerf and Kahn - architecture internal changes required to
for interconnecting networks interconnect networks
• best effort service model
• 1976: Ethernet at Xerox PARC • stateless routers
• late70’s: proprietary architectures: • decentralized control
DECnet, SNA, XNA define today’s Internet
• late 70’s: switching fixed length architecture
packets (ATM precursor)
• 1979: ARPAnet has 200 nodes
Internet history
1980-1990: new protocols, a proliferation of
networks
• 1983: deployment of TCP/IP • new national networks:
• 1982: smtp e-mail protocol Csnet, BITnet, NSFnet,
defined Minitel
• 1983: DNS defined for name-
• 100,000 hosts connected
to-IP-address translation to confederation of
networks
• 1985: ftp protocol defined
• 1988: TCP congestion control
Internet history
1990, 2000’s: commercialization, the Web,
new apps
• early 1990’s: ARPAnet late 1990’s – 2000’s:
decommissioned
• 1991: NSF lifts restrictions on • more killer apps: instant
commercial use of NSFnet messaging, P2P file sharing
(decommissioned, 1995)
• network security to

early 1990s: Web
• hypertext [Bush 1945, Nelson forefront
1960’s] • est. 50 million host, 100
• HTML, HTTP: Berners-Lee
• 1994: Mosaic, later Netscape million+ users
• late 1990’s: commercialization • backbone links running at
of the Web
Gbps
Internet history
2005-present
• ~750 million hosts
• Smartphones and tablets
• Aggressive deployment of broadband access
• Increasing ubiquity of high-speed wireless access
• Emergence of online social networks:
• Facebook: soon one billion users
• Service providers (Google, Microsoft) create their own networks
• Bypass Internet, providing “instantaneous” access to search, emai, etc.
• E-commerce, universities, enterprises running their services in “cloud” (eg,
Amazon EC2)
covered a “ton” of material! you now have:
• Internet overview • context, overview, “feel” of
• what’s a protocol? networking
• network edge, core, access network
• packet-switching versus circuit-
• more depth, detail to follow!
switching
• Internet structure
• performance: loss, delay,
throughput
• layering, service models
• security
• history
Module I: Introduction to computer network Basics, Computing Services, Servers, Data bases,
Networking software, analytics and intelligence, interconnection of peering points, Autonomous
systems.
Module II: Cloud formation ubiquitous, convenient on demand network access of pooled resource
creation, configuration, customization.
Module III: Models of Cloud: Public, Private and Hybrid Clouds, and service models - Infrastructure
as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)methods and
technology used.
Module IV: Cloud virtualization: Hardware /Software /Data servers, Networks infrastructure.
Module V: Service providers and their role infrastructure creation/support, security and
Administration
Module VI: Use cases and resource Provisioning Oracle cloud infrastructure configuration and
management
Text Books
1. Cloud Computing Principles and Paradigm, Rajkumar Buyya, James Broberg, Andrzej Goscinski,
Wiley Publishers.2011
Reference Books
1. Barrie Sosinsky, - Cloud Computing Bible|| John Wiley & Sons, 2010
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, - Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance, O'Reilly 2009
3. Cloud Computing: A Practical Approach, Toby Velte, Anthony TVelte, Robert Elsenpeter,
52
McGrawHill,2009
Form Desktop application to Hosted
Application
Desktop Application – Installation-
Application Specific User Owned
Replaced by
Software maintenance is reduce as taken care
by providers
Cloud Infrastructure helps eliminate the traditional IT
infrastructure
Cloud Advantage and scaling
[Link] social gaming company

Failed to scale the IT infrastructure like Servers, access platform, networking resource
User response time increased – users switched away
Cuil -search engine -server failure to respond was
Animoto- photo+music =video with animation [Tempo of music >> picture motion speed
Animoto- photo+music =video with animation [Tempo of music >> picture motion speed
increased]
User experience is affected
Offered on facebook – scaled from 5 server to 5000 server on cloud
Cloud advantage -rededuency in infra
• 1. Cloud Computing
• 2. History
• 3. Characteristics
• 4. Model

73
What is Cloud
Computing?
• Cloud Computing is a general term used to describe a new class of network based
computing that takes place over the Internet,
• basically a step on from Utility Computing
• a collection/group of integrated and networked hardware, software and Internet
infrastructure (called a platform).
• Using the Internet for communication and transport provides hardware, software
and networking services to clients
• Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources (e.g., networks, servers,
storage, applications, and services)
• These platforms hide the complexity and details of the underlying infrastructure from
users and applications by providing very simple graphical interface or API
(Applications Programming Interface).

74
What is Cloud
Computing?
• In addition, the platform provides on demand services, that are
always on, anywhere, anytime and any place.
• Pay for use and as needed, elastic
• scale up and down in capacity and functionalities
• The hardware and software services are available to
• general public, enterprises, corporations and businesses markets

75
Cloud Summary
• Cloud computing is an umbrella term used to refer to Internet based
development and services

• A number of characteristics define cloud data, applications services and


infrastructure:
• Remotely hosted: Services or data are hosted on remote infrastructure.
• Ubiquitous: Services or data are available from anywhere.
• Commodified: The result is a utility computing model similar to traditional that of
traditional utilities, like gas and electricity - you pay for what you would want!

76
• In short we can say that
• Cloud computing is Internet-based computing, whereby shared
resources, software and information are provided to computers
and other devices on-demand, like the electricity grid.
• The cloud computing is a culmination of numerous attempts at
large scale computing with seamless access to virtually limitless
resources.

77
• The cloud symbol is typically used to represent the internet.
• Cloud computing is now commonly used to describe the delivery of
software, infrastructure and storage services over the internet.
• Users of the cloud can benefit from other organizations delivering
services associated with their data, software and other computing
needs on their behalf, without the need to own or run the usual
physical hardware (such as servers) and software (such as email)
themselves.
• Cloud computing is the next stage in the evolution of the internet, it
provides the means through which everything from computing power
to computing infrastructure, applications and business processes —
can be delivered to you as a service wherever and whenever you need
them.

78
Why use cloud computin
1. Reduce capex g?
costs and improve the predictability of on-going operating
expenses.
2. Enable your employees to work from anywhere.
3. Access your data anytime, without risks associated with physical storage since
this is managed by cloud providers.
4. Avoid complex disaster recovery planning; let cloud computing vendors take care
of this for you.
5. Access the same class of technology as your bigger, more established
competitors .
6. Let cloud computing vendors do your server maintenance for you, freeing up
your resources for more important tasks
7. Improve your document control, with all your files in one central location,
allowing everyone to work from one central copy .
79
HISTORY AND
EVOLUTION
• Cloud computing is one the most innovative technology of our time. Following is a
brief history of Cloud computing.

80
• EARLY 1960S:- The computer scientist John McCarthy, come up with concept of
timesharing, and enabling Organization to simultaneously use an expensive
mainframe. This computing is described as a significant contribution to the
development of the Internet, and a pioneer of Cloud computing.
• IN 1969:- The idea of an “Intergalactic Computer Network” or “Galactic Network” (a
computer networking concept similar to today’s Internet) was introduced by J.C.R.
Licklider, who was responsible for enabling the development of ARPANET (Advanced
Research Projects Agency Network). His vision was for everyone on the globe to be
interconnected and being able to access programs and data at any site, from
anywhere.
• IN 1970:- Using virtualization software like VMware. It become possible to run more
than one Operating System simultaneously in an isolated environment. It was possible
to run a completely different Computer (virtual machine) inside a different Operating
System.
• IN 1997:- The first known definition of the term “Cloud Computing” seems to be by
Prof. Ramnath Chellappa in Dallas in 1997 – “A computing paradigm where the
boundaries of computing will be determined by economic rationale rather than
technical limits alone.” 81
• IN 1999:- The arrival of [Link] in 1999 pioneered the concept of delivering
enterprise applications via simple website. The services firm covered the way for both
specialist and mainstream software firms to deliver applications over the Internet.
• IN 2003:- The first public release of Xen, which creates a Virtual Machine Monitor
(VMM) also known as a hypervisor, a software system that allows the execution of
multiple virtual guest operating systems simultaneously on a single machine.
• IN 2006:- In 2006, Amazon expanded its cloud services. First was its Elastic Compute
cloud (EC2), which allowed people to access computers and run their own applications
on them, all on the cloud. Then they brought out Simple Storage Service (S3). This
introduced the pay-as-you-go model to both users and the industry as a whole, and it
has basically become standard practice now.
• IN 2013:-The Worldwide Public Cloud Services Market totalled £78bn, up 18.5 per
cent on 2012, with IaaS (infrastructure-as-a-service) the fastest growing market
service.
• IN 2014:- In 2014, global business spending for infrastructure and services related to
the cloud will reach an estimated £103.8bn, up 20% from the amount spent in 2013
(Constellation Research).
82
What’s the Internet: “nuts and
bolts” view
PC • millions of connected mobile network
server
computing devices:
• hosts = end systems
wireless global ISP
laptop • running network apps
smartphone
home
network
regional ISP
communication
wireless
links
wired
links
links  fiber, copper,
radio,
satellite
 transmission
Packet
router rate: switches: institutional
forward packets
bandwidth
network
(chunks of data)
Creating a network app application
transport
network
data link

write programs that: physical

• run on (different) end systems


• communicate over network
• e.g., web server software communicates
with browser software
no need to write software for network-
core devices application
transport
network

• network-core devices do not run user data link


physical
application
transport

applications
network
data link
physical

• applications on end systems allows for


rapid app development, propagation
Client-server architecture
server:
• always-on host
• permanent IP address
• data centers for scaling

clients:
• communicate with server
client/server
• may be intermittently connected
• may have dynamic IP addresses
• do not communicate directly with
each other
P2P architecture
• no always-on server
peer-peer
• arbitrary end systems directly
communicate
• peers request service from other
peers, provide service in return to
other peers
• self scalability – new peers bring
new service capacity, as well as
new service demands
• peers are intermittently connected
and change IP addresses
• complex management
Processes communicating
process: program running clients, servers
within a host client process: process that initiates
• within same host, two processes communication
communicate using inter-process server process: process that waits
communication (defined by OS) to be contacted
• processes in different hosts
communicate by exchanging  aside: applications with P2P
messages architectures have client
processes & server
processes
Sockets
• process sends/receives messages to/from its socket
• socket analogous to door
• sending process shoves message out door
• sending process relies on transport infrastructure on other side of
door to deliver message to socket at receiving process

application application
socket controlled by
process process app developer

transport transport
network network controlled
link
by OS
link Internet
physical physical
Addressing processes
• to receive messages, process must • identifier includes both IP address
have identifier and port numbers associated with
process on host.
• host device has unique 32-bit IP • example port numbers:
address • HTTP server: 80
• Q: does IP address of host on which • mail server: 25
process runs suffice for identifying • to send HTTP message to
the process? [Link] web server:
• IP address: [Link]
• port number: 80
 A: no, many processes can • more shortly…
be running on same host
Internet apps: application, transport
protocols
application underlying
application layer protocol transport protocol

e-mail SMTP [RFC 2821] TCP


remote terminal access Telnet [RFC 854] TCP
Web HTTP [RFC 2616] TCP
file transfer FTP [RFC 959] TCP
streaming multimedia HTTP (e.g., YouTube), TCP or UDP
RTP [RFC 1889]
Internet telephony SIP, RTP, proprietary
(e.g., Skype) TCP or UDP
Internet transport-layer
protocols
• reliable, in-order delivery (TCP) applicatio
n
transport
• congestion control network
data link
physical network

• flow control

lo
network data link

gi
data link physical

ca
physical
• connection setup

l
network

en
data link

d-
physical

• unreliable, unordered delivery:

en
network

d
data link

tr
UDP

a
physical

ns
network

po
data link

r
• no-frills extension of “best-effort” IP

t
physical
network
data link applicatio
physical n

• services not available:


network
data link transport
physical network
data link

• delay guarantees physical

• bandwidth guarantees
Internet transport-layer
protocols
• reliable, in-order delivery (TCP) applicatio
n
transport
• congestion control network
data link
physical network

• flow control

lo
network data link

gi
data link physical

ca
physical
• connection setup

l
network

en
data link

d-
physical

• unreliable, unordered delivery:

en
network

d
data link

tr
UDP

a
physical

ns
network

po
data link

r
• no-frills extension of “best-effort”

t
physical
network
data link applicatio

IP physical
network
data link
n
transport
physical network

• services not available: data link


physical

• delay guarantees
• bandwidth guarantees
Network layer
application

• transport segment from sending to transport


network

receiving host
data link
physical
network network
data link data link
• on sending side encapsulates network
data link
physical
physical physical

segments into datagrams


network network
data link data link
physical physical

• on receiving side, delivers segments to network network

transport layer
data link data link
physical physical
network
data link

• network layer protocols in every host, physical


application

router
network transport
data link network network
network physical data link data link
physical
• router examines header fields in all IP
data link physical
physical

datagrams passing through it


IP addressing: introduction
[Link]
• IP address: 32-bit identifier for [Link]
host, router interface
• interface: connection between
[Link]
[Link] [Link]

host/router and physical link


• router’s typically have multiple [Link]
[Link]
interfaces [Link]

• host typically has one or two interfaces


(e.g., wired Ethernet, wireless 802.11)
• IP addresses associated with each [Link] [Link]

interface
[Link] = 11011111 00000001 00000001 00000001

223 1 1 1
IP addressing: introduction
[Link]

Q: how are interfaces actually [Link]


connected?
[Link]
A: we’ll learn about that [Link] [Link]

[Link]
[Link]
[Link]

A: wired Ethernet interfaces


connected by Ethernet switches
[Link] [Link]

For now: don’t need to worry about how


one interface is connected to another (with
no intervening router)
A: wireless WiFi interfaces
connected by WiFi base station
Subnets
• IP address: [Link]
• subnet part - high order bits
• host part - low order bits [Link]
[Link] [Link]
[Link]

• what’s a subnet ? [Link]


• device interfaces with same subnet [Link] [Link]
part of IP address subnet
• can physically reach each other
without intervening router [Link] [Link]

network consisting of 3 subnets


Subnets
[Link]/24
[Link]/24
recipe [Link]

to determine the subnets,


[Link] [Link]
detach each interface from its [Link] [Link]
host or router, creating islands [Link]
of isolated networks [Link] [Link]

each isolated network is called subnet

a subnet [Link]
[Link]

[Link]/24

subnet mask: /24


Subnets [Link]

how many? [Link] [Link]

[Link]

[Link] [Link]

[Link] [Link]
[Link] [Link]

[Link] [Link]

[Link] [Link] [Link] [Link]


IP addressing: CIDR

CIDR: Classless InterDomain Routing


 subnet portion of address of arbitrary length
 address format: a.b.c.d/x, where x is # bits in subnet portion of address

subnet host
part part
11001000 00010111 00010000 00000000
[Link]/23
IP addresses: how to get
one?
Q: how does network get subnet part of IP addr?
A: gets allocated portion of its provider ISP’s address
space

ISP's block 11001000 00010111 00010000 00000000 [Link]/20

Organization 0 11001000 00010111 00010000 00000000 [Link]/23


Organization 1 11001000 00010111 00010010 00000000 [Link]/23
Organization 2 11001000 00010111 00010100 00000000 [Link]/23
... ….. …. ….
Organization 7 11001000 00010111 00011110 00000000 [Link]/23
Hierarchical addressing: route
aggregation
hierarchical addressing allows efficient advertisement of routing
information:

Organization 0
[Link]/23
Organization 1
“Send me anything
[Link]/23 with addresses
Organization 2 beginning
[Link]/23 . Fly-By-Night-ISP [Link]/20”
.
. . Internet
.
Organization 7 .
[Link]/23
“Send me anything
ISPs-R-Us
with addresses
beginning
[Link]/16”
Hierarchical addressing: more specific
routes
ISPs-R-Us has a more specific route to Organization 1

Organization 0
[Link]/23

“Send me anything
with addresses
Organization 2 beginning
[Link]/23 . Fly-By-Night-ISP [Link]/20”
.
. . Internet
.
Organization 7 .
[Link]/23
“Send me anything
ISPs-R-Us
with addresses
Organization 1 beginning [Link]/16
or [Link]/23”
[Link]/23
IP addressing: the last word...

Q: how does an ISP get block of addresses?


A: ICANN: Internet Corporation for Assigned Names and Numbers
[Link]
 allocates addresses
 manages DNS
 assigns domain names, resolves disputes
NAT: network address
translation
rest of local network
Internet (e.g., home network)
10.0.0/24 [Link]

[Link]
[Link]
[Link]

[Link]

all datagrams leaving datagrams with source or


local destination in this network
network have same have 10.0.0/24 address for
single source NAT IP source, destination (as usual)
address:
[Link],different
IP Addressing
• It designates the location of a device on the network.
• An IP address is a software address, not a hardware address—the
latter is hardcoded on a network interface card (NIC) and used
for finding hosts on a local network.
• IP addressing was designed to allow a host on one network to
communicate with a host on a different network, regardless of
the type of LANs the hosts are participating in

IP Terminology
• Network address the designation used in routing to send packets to
a remote network,
• for example, [Link], [Link], and [Link].
• Broadcast address used by applications and hosts to send
information to all nodes on a network.
• Examples include [Link], which is all networks, all
nodes; [Link], which is all subnets and hosts on
network [Link]; and [Link], which broadcasts to all
IP Addressing Scheme
IP address consists of 32 bits of information
IP address using one of three methods:
Dotted-decimal, as in [Link]
Binary, as in 10101100.00010000.00011110.00111000
Hexadecimal, as in 82 39 1E 38

Network Addressing
The network address uniquely identifies each network.
Every machine on the same network shares that network address as part of its IP
address.
In the IP address [Link], for example, 172.16 is the network address.
Network Address Range

Range of network addresses. 00000000=0 01111111=127

Range for a Class B network: 10000000=128 10111111=191

Range for a Class C network: 11000000=192 11011111=223

The addresses between 224 and 255 are reserved for Class D and E networks. Class D is used
for multicast addresses and Class E for scientific purposes.
Practice Example

Class C subnet address mask [Link]=Network address [Link]=Subnet Mask

How many subnets? Since 192 are two bits on (11000000), the answer would be 2 2 –2=2.

How many hosts per subnet? We have 6 host bits off (11000000), so the equation would be 2 6–2=62 hosts

What are the valid subnets?


256–192=64, which is the first subnet and our base number or variable? Keep adding the variable to it until you
reach the subnet mask. 64+64=128. 128+64=192, which is invalid because it is the subnet mask (all subnet bits
turned on). Our two valid subnets are, then, 64 and 128.

What are the valid hosts?


These are the numbers between the subnets. The easiest way to find the hosts is to write out the subnet address
and the broadcast address. This way the valid hosts are obvious.

What is the broadcast address for each subnet?


The number right before the next subnet is all host bits turned on and is the broadcast address. 64 and 128
subnets, the valid host ranges of each, and the broadcast address of both subnets.
Practice Example
[Link]=Network number [Link]=Subnet mask
240 is 11110000 in binary. 24–2=14 subnets
Four host bits, or 24–2=14
256–240=16.
16+16=32. 32+16=48. 48+16=64. 64+16=80. 80+16=96. 96+16=112. 112+16=128. 128+16=144. 144+16=160.
160+16=176. 176+16=192. 192+16=208. 208+16=224. 224+16=240, which is our subnet mask and therefore
invalid
What are the valid hosts?
Practice Example
[Link]=Network address [Link]=Subnet address
24–2=14.
212–2=4094.
256–240=16
16+16=32. 32+16=48. 48+16=64. 64+16=80. 80+16=96. 96+16=112. 112+16=128. 128+16=144. 144+16=160.
160+16=176. 176+16=192. 192+16=208. 208+16=224. 224+16=240, which is our subnet mask and therefore
invalid

The following table shows the first three subnets, valid hosts, and broad cast addresses in a Class B [Link]
mask.
Module I: Introduction to computer network Basics, Computing Services, Servers, Data bases,
Networking software, analytics and intelligence, interconnection of peering points, Autonomous
systems.
Module II: Cloud formation ubiquitous, convenient on demand network access of pooled resource
creation, configuration, customization.
Module III: Models of Cloud: Public, Private and Hybrid Clouds, and service models - Infrastructure
as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)methods and
technology used.
Module IV: Cloud virtualization: Hardware /Software /Data servers, Networks infrastructure.
Module V: Service providers and their role infrastructure creation/support, security and
Administration
Module VI: Use cases and resource Provisioning Oracle cloud infrastructure configuration and
management
Text Books
1. Cloud Computing Principles and Paradigm, Rajkumar Buyya, James Broberg, Andrzej Goscinski,
Wiley Publishers.2011
Reference Books
1. Barrie Sosinsky, - Cloud Computing Bible|| John Wiley & Sons, 2010
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, - Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance, O'Reilly 2009
3. Cloud Computing: A Practical Approach, Toby Velte, Anthony TVelte, Robert Elsenpeter,
111
McGrawHill,2009
How Cloud Computing works?

• For understanding How Cloud computing works,


• first you must understand –
What is Cloud computing? and
Benefits of Cloud computing,
• second you should understand the different types of
Cloud offering like
• Infrastructure as a Service (IaaS),
• Platform as a Service (PaaS),
• Software as a Service (SaaS) or must say “X as a Service,
(XaaS)” or “Anything as a Service”.

112
• The fist building block of Cloud is infrastructure where the Cloud will be
implemented. It is a wrong assumption that environment should be virtualized,
but cloud is a way to request resource in on-demand way. If you have a solution to
provide resource in on-demand way on bare metal, then it is also a Cloud service.
This infrastructure supports different types of Cloud Service like IaaS, PaaS, SaaS
etc.
• To provide these services you need Operating System Service, which will be
charged with requested service.
• Business System Service (BSS) – This is mainly used to validate the request and
create the invoice for the consumed services. There are multiple metrics, which
are used to create the invoice like Number of users, CPUs, Memory, Storage, I/Os
usage hours/month etc.

113
• How Cloud computing works in reality
• For accessing Cloud services, first step is to register on Cloud service
provider portal and create an account. Now login into portal and you can
order your services though the Cloud service consumer area. These services
had been created by Cloud service provider. These services can be a simple
virtual machine (VM), some network component, an Application service or
any platform service etc.
• Business System Service (BSS)
• The Cloud provider will validate your request through Business System
Service (BSS), if the validation is OK (like Credit Card detail, Contract etc.),
Service provider will provide the requested service through Operating
System Service.
• To access these all service Cloud service provider will provide you a
credentials to access or make any request for service. Monthly invoice get
generate for services used by you.
114
Do you Use the Cloud?
Cloud Computing
Characteristics
Common Characteristics:

Massive Scale Resilient Computing

Homogeneity Geographic Distribution

Virtualization Service Orientation

Low Cost Software Advanced Security

Essential Characteristics:

On Demand Self-Service
Broad Network Access Rapid Elasticity
Resource Pooling Measured Service

Adopted from: Effectively and Securely Using the Cloud Computing Paradigm by peter Mell, Tim 116
Grance
1. Shared / Pooled Resources:

• Resources are drawn from a common pool


• Common resources build economies of scale
• Common infrastructure runs at high efficiency
2. Broad Network Access:

• Open standards and APIs


• Almost always IP, HTTP, and REST
• Available from anywhere with an internet connection

117
3. On-Demand Self-Service:
. Completely automated
• Users abstracted from the implementation
• Near real-time delivery (seconds or minutes)
• Services accessed through a self-serve
web interface

4. Scalable and Elastic:


Resources dynamically-allocated between users
• Additional resources dynamically-released when needed
• Fully automated

5. Metered by Use:
Services are metered, like a utility
• Users pay only for services used
118
• Services can be cancelled at any time
API – Application configuration for new updates
No knowledge of networking resources
required.
Deployment Models
Public cloud
• Public cloud (off-site and remote) describes cloud computing where resources are dynamically
provisioned on an on-demand, self-service basis over the Internet, via web applications/web
services, open API, from a third-party provider who bills on a utility computing basis.
Private cloud
• A private cloud environment is often the first step for a corporation prior to adopting a public
cloud initiative. Corporations have discovered the benefits of consolidating shared services on
virtualized hardware deployed from a primary datacenter to serve local and remote users.
Hybrid cloud
• A hybrid cloud environment consists of some portion of computing resources on-site (on
premise) and off-site (public cloud). By integrating public cloud services, users can leverage cloud
solutions for specific functions that are too costly to maintain on-premise such as virtual server
disaster recovery, backups and test/development environments.
Community cloud
• A community cloud is formed when several organizations with similar requirements share
common infrastructure. Costs are spread over fewer users than a public cloud but more than a
single tenant.
Public Cloud – Host in public domain accessible to paying users (Amazon, Google, Microsoft etc)
Private – the cloud infra is operated solely for an organization; it may be managed by the organization
or a third party and may exist on the premise or off premise
Such cloud infra is underutilized in terms of CPU usage

1. Cost of overestimating the hardware need is much less than the risk of underestimating as due to
less IT infra the services may crash
2. Procurement time in hardware – networking- software deployment is more

Hardware Virtualization
Due to More resource usage , physical resource cannot be moved every time.
Deploy a virtualization layer like VMware ESXi, Microsoft hyberV, Xen
Popular cloud companies , Services and
Products

Public Cloud Companies


API similar to S3, and VM instance of AWS
Module I: Introduction to computer network Basics, Computing Services, Servers, Data bases,
Networking software, analytics and intelligence, interconnection of peering points, Autonomous
systems.
Module II: Cloud formation ubiquitous, convenient on demand network access of pooled resource
creation, configuration, customization.
Module III: Models of Cloud: Public, Private and Hybrid Clouds, and service models - Infrastructure
as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)methods and
technology used.
Module IV: Cloud virtualization: Hardware /Software /Data servers, Networks infrastructure.
Module V: Service providers and their role infrastructure creation/support, security and
Administration
Module VI: Use cases and resource Provisioning Oracle cloud infrastructure configuration and
management
Text Books
1. Cloud Computing Principles and Paradigm, Rajkumar Buyya, James Broberg, Andrzej Goscinski,
Wiley Publishers.2011
Reference Books
1. Barrie Sosinsky, - Cloud Computing Bible|| John Wiley & Sons, 2010
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, - Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance, O'Reilly 2009
3. Cloud Computing: A Practical Approach, Toby Velte, Anthony TVelte, Robert Elsenpeter,
134
McGrawHill,2009
Cloud Computing &
Virtualization
• Computing resources in cloud can be added in real time to
meet demand of computing
• Possible as resource virtualization restricts (decouples)
applications from direct access to physical resources

Technological advancements towards maturity of cloud


Resource virtualization has enabled
- decoupling software systems from physical hardware
devices.
- computing systems accessed by users have become
portable over other set of hardware devices.
- makes the system more fault tolerant
- puts a stop on resource shortage problem
- decoupling feature provides scope for adding more
resources in the resource pool.
- system can grow as per requirement -scalable
system.

Convergence of technologies for evolution of cloud


computing
Hardware virtualization technology also emerged as a major innovation in the field of computing. It
helps in designing dynamic and flexible computing system (by allowing application system
mobility).

Hardware resources are represented as


simulated software components (implemented
through resource virtualization technique) and
are delivered to consumers via Internet (or
network) using web services

Use those simulated components just like real


hardware devices and can build computing
system with necessary processor, memory,
storage and network facilities.

The way towards cloud


computing
Virtualization

Encompasses a collection of solutions allowing the abstraction of some of the


fundamental elements for computing such as: hardware, runtime environments,
storage, and networking.
Virtualization has been around for more than 40 years, but its application has always been
limited by technologies that did not allow an efficient use of virtualization solutions

hardware virtualization allows simulating the hardware interface expected by an operating


system. Hardware virtualization allows the co-existence of different software stacks on top of
the same hardware.

These stacks are contained inside virtual machine instances, which operate completely
isolated from each other.

High-performance server can host several virtual machine instances, thus creating the
opportunity of having customized software stack on demand.

This is the base technology that enables Cloud computing solutions delivering virtual server on
demands, such as Amazon EC2, RightScale, VMware vCloud, and others.

Together with hardware virtualization, storage and network virtualization complete the range
of technologies for the emulation of IT infrastructure.
Virtualization refers to the representation of physical computing resources in simulated form
having made through the software.

Layer of software (installed over active physical machines) is referred as layer of virtualization.

This layer transforms the physical computing resources into virtual form which users use to
satisfy their computing needs
VIRTUALIZING PHYSICAL COMPUTING RESOURCES

Computing devices like processor, primary memory, other resources like storage, network devices
(like switch, router etc.), the communication links and peripheral devices (like keyboard, mouse,
printer etc.)
Core computing resources a virtualized component can only be operational when a physical
resource empowers it from the back end.
For example, a virtual processor can only work when there is a physical processor linked with it.
Simulated devices produced through virtualization may or may not resemble the actual physical
components (in quality, architecture or in quantity)
Users get access to three processors while there is one physical processor in reality. Or, 32-bit
processor can be produced (in virtual form) from 64-bit actual physical processor.
Software for virtualization consists of a set of control programs.
- It offers all of the physical computing resources in custom made simulated (virtual) form which
users can utilize to build virtual computing setup or virtual computers or virtual machines (VM).

- Users can install operating system over virtual computer just like they do it over physical
computer.

- Operating system installed over virtual computing environment is known as guest operating
system.

- When virtualization technique is in place, the guest OS executes as if it were running directly on
the physical machine.
UNDERSTANDING ABSTRACTION

virtualization - idea of providing logical access to physical resources.

Virtualization can be defined as the abstraction of different computing resources like processor,
memory, storage, network etc.

Abstraction is the process of hiding the complex and non-essential characteristics of a system.

Through abstraction, a system can be presented in simplified manner for some particular use
after omitting unwanted details from users.

In computing, abstraction is implemented through the layers of software.

The layer of operating system can be treated as a layer of abstraction.

In cloud computing, resource virtualization which adds a layer of software over physical
computing resources to create virtual resources, acts as a layer of abstraction. This abstraction
makes it easier to offer more flexible, reliable and powerful service
MACHINE OR SERVER LEVEL
VIRTUALIZATION
The Layer of Virtualization

Set of control programs that creates the environment for the virtual machines
to run on. - provides the access to the system resources to the virtual
machines.

- controls and monitors the execution of the virtual machines over it.

- referred as the Hypervisor or Virtual Machine Monitor (VMM).

- hypervisor abstracts the underlying software and/or hardware


environments and represents virtual system resources to its users.

- facilitates the existence of multiple VMs those are not bound to


share same (underlying) OS kernel.

- Due to this reason, it becomes possible to run different operating systems


in those virtual machines.

- The hypervisor layer provides an administrative system console through


which the virtual system environment (like number of virtual components
to produce or capacity of the components) can be managed
Machine Virtualization Techniques
Hosted Approach

Operating system is first installed on the physical machine to


activate it. The OS installed over the host machine is referred
as host operating system. The hypervisor is then installed
over this host OS. This type of hypervisor is referred to as
Type 2 hypervisor or Hosted hypervisor
Host OS acts as the first layer of software over the physical
resources. Hypervisor is the second layer of software & guest
operating systems run as the third layer of software.
EX: VMWare Workstation and Microsoft Virtual PC type 2
hypervisors.
Benefits: host OS supplies the hardware drivers for the
underlying physical resources. Eases installation and
configuration of the hypervisor. It makes the type-2
hypervisors compatible for a wide variety of hardware
platform.
Drawbacks: A hosted hypervisor does not have direct access to the hardware resources and
hence, all of the requests from virtual machines must go through the host OS.
This degrade the performance of the virtual machines. Lack of support for real-time operating
systems. As the underlying host OS controls the scheduling of jobs it becomes unrealistic to run a
real-time OS inside a VM using hosted virtualization.
Machine Virtualization Techniques

Bare Metal Approach: Removal of the Host


OS
Hypervisor is directly installed over the physical machine
it is the first layer over hardware resources; hence, the
technique is referred as bare metal approach.

Here, the VMM or the hypervisor communicates directly


with system hardware, acting as low-level virtual machine
monitor and also called as Type 1 hypervisor or Native
Hypervisor.

Ex: VMware’s ESX and ESXi Servers, Microsoft’s Hyper-V,


solution Xen
Benefits: Since the bare metal hypervisor can directly access

the hardware resources in most of the cases it provides better


performance in comparison to the hosted hypervisor.
For bigger application like enterprise data centers, bare-metal virtualization is more suitable because
usually it provides advanced features for resource and security management.
Administrators get more control over the host environment.
Drawbacks: As any hypervisor usually have limited set of device drivers built into it, so the bare
metal hypervisors have limited hardware support and cannot run on a wide variety of hardware
IaaS component stack
PaaS component stack
SaaS component stack
Public Cloud – Host in public domain accessible to paying users (Amazon, Google, Microsoft etc)
Private – the cloud infra is operated solely for an organization; it may be managed by the organization
or a third party and may exist on the premise or off premise
Such cloud infra is underutilized in terms of CPU usage

1. Cost of overestimating the hardware need is much less than the risk of underestimating as due to
less IT infra the services may crash
2. Procurement time in hardware – networking- software deployment is more

Hardware Virtualization
Due to More resource usage , physical resource cannot be moved every time.
Deploy a virtualization layer like VMware ESXi, Microsoft hyberV, Xen
Hypervisor-Based Virtualization
Full Virtualization Approaches Para-Virtualization or OS-Assisted Virtualization

The virtualization management task is transferred from the hypervisor towards the guest operating systems. Normal
versions of available operating systems are not capable of doing this. They need special modification for this
capability inclusion. T his modification is called porting. Each guest OS is explicitly ported for the para-application
program interface (API).
Best known example of para virtualization hypervisor is the open-source Xen project which uses a customized Linux
kernel.
Hardware-Assisted Virtualization
Inspired by software-enabled virtualization, hardware vendors later started manufacturing devices
tailored to support virtualization.
Intel and AMD started this by including new virtualization features in their processors.
AMD-Virtualization (AMD-V) and Intel Virtualization Technology (Intel-VT) allows some privileged
CPU calls from the guest OS to be directly handled by the CPU.
These calls do not require to be translated by the hypervisors, eliminating the need for binary
translation or para-virtualization , only possible when specific combinations of hardware
components are used.
Many bare-metal hypervisors make use of this technology.
Hypervisors like Xen, Microsoft’s Hyper-V or VMWare ESXi Server can take the advantages of the
hardware-assisted virtualization.
OPERATING SYSTEM LEVEL VIRTUALIZATION: REMOVAL OF THE
HYPERVISOR
Operating system level virtualization (also called as system level virtualization)
- no hypervisor is used and the virtual servers are enabled by the kernel of the operating system of
physical machine
- the kernel of the OS installed over physical system is shared among all of the virtual servers
running over it.
- all of the virtual servers share a single kernel and same OS as
the parent system.
- create multiple logically-distinct user-space instances (virtual
servers) over a single instance of an OS kernel.
- known as Operating System Virtualization or Shared Kernel
Approach.
- Ex: FreeBSD’s jail, Linux VServer, OpenVZ
- All can run logically-distinct user-spaces on top of a single
kernel.

Advantages: it is lighter in weight since all of the virtual


servers share a single instance of an OS kernel. Enables a single
physical system to support many virtual servers than the
number of complete virtual machines it could support.

Limitations: Sharing of OS kernel). Although different


distributions (like Linux distribution) of the same system kernel
Hardware can be customized, management, As number of
such VM increase
Manual VM machine management is more cumbersome

Software with UI to configure and provision VM for usage Private /False Cloud/ Fast
Cloud.
Share infrastructure and compliance cost
Hybrid – when private cloud is out of service it used the service of the
public cloud
Network Virtualization
- process of combining network resources and network functionality into a single, software-
based administrative entity called as a virtual network.
- two common forms of network virtualization are
Virtual device-based virtual network: virtualized devices form the network.
All virtual networking devices (including virtual computers, virtual switches, virtual routers etc.)
communicate using actual (non-virtual) network protocols such as Ethernet as well as
virtualization protocols such as the VLAN.
This is actual network virtualization where the network is formed with all virtual components.

Protocol based virtual network: Rather than virtualizing devices, it creates virtual area
network.

Virtual LAN (VLAN) and virtual private network (VPN) are examples of such virtualizations.
Are logical local area networks (logical LANs) where the underlying physical LAN’s structure is
something else.
Several physical LANs which are actually part of public network (such as the Internet) can
function as a single logical LAN.
Enables network devices (such as computers and switches) to send and receive data across
shared or public networks as if they are part of a private network. The devices can
Storage Virtualization

In computing system, the storages have always been directly linked with the physical servers
traditional,
Now virtualized storage systems are linked with servers and actual (physical) storage systems
remain hidden.
Like other computing resources, virtualization of storage also happens through layer of
software which creates logical abstraction of the pooling of physical storage devices having
linked together by network.
Data stored in logical (virtualized) storage devices ultimately get stored in some physical
storage disks.
The advent of Storage Area Networks (SAN) has made the pooling (and hence the
virtualization as well) of physical storage systems easier.
There are many commercial virtualized cloud storage systems available in the market.
Ex: Google Cloud Storage,
Microsoft’s Azure Storage,
Amazon Simple Storage System (S3)
Amazon Elastic Block Store (EBS)
Desktop Virtualization

Not considered as in the core category of computing infrastructure virtualization concept.


But it is the key to business as it can lower the total cost of ownership and enhances security
of system, application and data.
Desktop virtualization is not same as remote desktop access.
Through desktop virtualization technology, any computer’s applications can be separated from
its desktop and user can get the look and feel of some other environment while using those
applications.
For instance, VMware Fusion 7 solution provides Mac-like experience while running Windows
applications on a Mac system.
In an enterprise environment, individual virtualized desktops can be maintained in a central
server and users can access those desktops by connecting to the central server.
Module I: Introduction to computer network Basics, Computing Services, Servers, Data bases,
Networking software, analytics and intelligence, interconnection of peering points, Autonomous
systems.
Module II: Cloud formation ubiquitous, convenient on demand network access of pooled resource
creation, configuration, customization.
Module III: Models of Cloud: Public, Private and Hybrid Clouds, and service models - Infrastructure
as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)methods and
technology used.
Module IV: Cloud virtualization: Hardware /Software /Data servers, Networks infrastructure.
Module V: Service providers and their role infrastructure creation/support, security and
Administration
Module VI: Use cases and resource Provisioning Oracle cloud infrastructure configuration and
management
Text Books
1. Cloud Computing Principles and Paradigm, Rajkumar Buyya, James Broberg, Andrzej Goscinski,
Wiley Publishers.2011
Reference Books
1. Barrie Sosinsky, - Cloud Computing Bible|| John Wiley & Sons, 2010
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, - Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance, O'Reilly 2009
3. Cloud Computing: A Practical Approach, Toby Velte, Anthony TVelte, Robert Elsenpeter,
161
McGrawHill,2009
Popular cloud companies , Services and
Products

Public Cloud Companies


API similar to S3, and VM instance of AWS
Cloud Security
1. Physical security of resources/servers
2. Data confidentiality – access base
3. Data integrity
4. Service availability – Denial of service

Cloud Security Model – application secure and cloud infra


security
Cloud has a shared security model
SOX also known as the corporate Auditing accountability and responsibility Act in US
Federal Law and HIPAA is health insurance portability and accountability act Audit for
Application Security -cloud User responsibility ensure
All the necessary patching and security updated to the software
Take necessary measures for prevention of attacks like SQL injection and cross
server scripting
Use of 3rd party tools for securing applications
Use penetration testing
Social engineering – Posing false identity and seek information
Data encryption while data in going to cloud
storage
Use VPA tunnel between cloud and usage
source
Challenges
Loss of physical control data
Faith in venders’ security infra
Lack of visibility in 3rd party audit
Obtain support for investigation -support
plan
Lack of visibility in system architecture no
detailed

Advantages
Better physical security
No special favor to any on entity
Better auditing for security
Clouds have consistent API across service USA Patriotic Act law can check to data stored
and regions
Singapore is encouraging safe data storage
Cloud security is solvable issue
Things to watch
- Security privacy
- Billing can some timed be complex
- Costing is totally in the hands of the
provider

Things to remember
Module I: Introduction to computer network Basics, Computing Services, Servers, Data bases,
Networking software, analytics and intelligence, interconnection of peering points, Autonomous
systems.
Module II: Cloud formation ubiquitous, convenient on demand network access of pooled resource
creation, configuration, customization.
Module III: Models of Cloud: Public, Private and Hybrid Clouds, and service models - Infrastructure
as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)methods and
technology used.
Module IV: Cloud virtualization: Hardware /Software /Data servers, Networks infrastructure.
Module V: Service providers and their role infrastructure creation/support, security and
Administration
Module VI: Use cases and resource Provisioning Oracle cloud infrastructure configuration and
management
Text Books
1. Cloud Computing Principles and Paradigm, Rajkumar Buyya, James Broberg, Andrzej Goscinski,
Wiley Publishers.2011
Reference Books
1. Barrie Sosinsky, - Cloud Computing Bible|| John Wiley & Sons, 2010
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, - Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance, O'Reilly 2009
3. Cloud Computing: A Practical Approach, Toby Velte, Anthony TVelte, Robert Elsenpeter,
170
McGrawHill,2009
Cloud Storage Services (RAID Array )

Copy of data is made across all data centres


In event of data corruption, hardware failed, the copy at all centre are checked
and restored
Simple Storage Services data storage in distributed manner
Cloud Compute Services Farm of servers
Popular software like word press is avail
Microsoft SQL Azure

Data sync feature to keep multiple data base


in sync.
Data sync feature to keep multiple data base
Code in JAVA, Python, PHP, GO
Cloud Use Cases – Cloud service is cost
effective
1. Availability
2. Durability
3. Cost of IT Infrastructure
API – Application configuration for new updates

You might also like