Cloud Computing
Cloud Computing
Nagpur
institutional
network
What’s a
protocol?
human protocols: network protocols:
• “what’s the time?” • machines rather than
humans
• “I have a question”
• all communication
• introductions activity in Internet
governed by protocols
… specific msgs sent
protocols define
… specific actions taken format, order of
when msgs received,
or other events msgs sent and
received among
network entities, &
actions taken on
What’s a
protocol?
a human protocol and a computer network protocol:
Hi TCP connection
request
Hi TCP connection
response
Got the
time? Get [Link]
2:00 <file>
time
home
access networks, network
regional ISP
physical media:
wired, wireless
communication
links
network core:
interconnected
routers institutional
network
network of
networks
Access networks and physical
media
Q: How to connect end
systems to edge router?
• residential access nets
• institutional access
networks (school,
company)
• mobile access networks
keep in mind:
• bandwidth (bits per
second) of access network?
• shared or dedicated?
Access net: digital subscriber line (DSL)
DSL splitter
modem DSLA
M
voice, data transmitted ISP
at different frequencies over DSL access
dedicated line to central office multiplexer
…
cable splitter
modem
C
O
V V V V V V
N
I I I I I I D D
T
D D D D D D A A
R
E E E E E E T T
O
O O O O O O A A
1 2 3 4 5 6 7 8 L9
Channels
…
cable splitter cable modem
modem CMTS termination system
data, TV transmitted at different
frequencies over shared cable ISP
distribution network
to/from headend or
central office
often combined
in single box
cable or DSL
modem
wireless router, firewall, NAT
access
point (54 Mbps) wired Ethernet (100
Mbps)
Enterprise access networks (Ethernet)
institutional link to
ISP (Internet)
institutional router
Ethernet institutional mail,
switch web servers
to Internet
to Internet
Physical media
• bit: propagates between
transmitter/receiver pairs
• physical link: what lies
twisted pair (TP)
between transmitter & • two insulated copper
receiver wires
• guided media: • Category 5: 100 Mbps,
• signals propagate in solid 1 Gpbs Ethernet
media: copper, fiber, coax • Category 6: 10Gbps
• unguided media:
• signals propagate freely,
e.g., radio
Physical media: coax, fiber
coaxial cable: fiber optic cable:
• two concentric copper glass fiber carrying
conductors light pulses, each
pulse a bit
• bidirectional high-speed
• broadband: operation:
• multiple channels on high-speed point-to-
cable point transmission
• HFC (e.g., 10’s-100’s
Gpbs transmission
rate)
low error rate:
repeaters spaced far
apart
immune to
Physical media: radio
• signal carried in radio link types:
electromagnetic terrestrial microwave
spectrum e.g. up to 45 Mbps
• no physical “wire” channels
LAN (e.g., WiFi)
• bidirectional 11Mbps, 54 Mbps
• propagation wide-area (e.g.,
environment effects: cellular)
• reflection 3G cellular: ~ few
• obstruction by Mbps
objects
satellite
Kbps to 45Mbps
• interference channel (or multiple
smaller channels)
270 msec end-end
The network core
• mesh of interconnected
routers
• packet-switching: hosts
break application-layer
messages into packets
• forward packets from one
router to the next, across
links on path from source
to destination
• each packet transmitted
at full link capacity
Internet structure: network of
networks
End systems connect to Internet via
access ISPs (Internet Service Providers)
Residential, company and university
ISPs
Access ISPs in turn must be
interconnected.
So that any two hosts can send packets
to each other
Resulting network of networks is very
complex
Evolution was driven by economics and
national policies
Let’s take a stepwise approach to describe
current Internet structure
Internet structure: network of
networks
Question: given millions of access ISPs, how to connect them
together?
access
… access
net
access
net …
net
access
access net
net
access
access net
net
…
…
access access
net net
access
net
access
net
access
net
access
… net
access access …
net access net
net
Internet structure: network of
networks
Option: connect each access ISP to every other access ISP?
access
… access
net
access
net …
net
access
access
net
… … net
access
access net
net
…
to each other directly doesn’t
…
access access
…
net
scale: O(N2) connections. net
access
net
access
net
access
net
access
…
… net
access access …
net access net
net
Internet structure: network of
networks
Option: connect each access ISP to a global
transit ISP? Customer and provider ISPs have
economic agreement.
… access
… access
net
access
net
net
access
access net
net
access
access net
net
…
…
global
access
net ISP access
net
access
net
access
net
access
net
access
… net
access access …
net access net
net
Internet structure: network of
networks
But if one global ISP is viable business, there will
be competitors ….
access
… access
net
access
net …
net
access
access net
net
access
access net
net
ISP A
…
…
access access
net ISP B net
access
ISP C
net
access
net
access
net
access
… net
access access …
net access net
net
Internet structure: network of
networks
But if one global ISP is viable business, there
will be competitors …. which must be
interconnected Internet exchange point
… access
… access
net
access
net
net
access
access net
net
access
IXP access
net
net
ISP A
…
…
access IXP access
net ISP B net
access
ISP C
net
access
net
access
net
peering link
access
… net
access access …
net access net
net
Internet structure: network of
networks
… and regional networks may arise to
connect access nets to ISPS
access
… access
net
access
net …
net
access
access net
net
access
IXP access
net
net
ISP A
…
…
access IXP access
net ISP B net
access
ISP C
net
access
net
access
net regional net
access
… net
access access …
net access net
net
Internet structure: network of
networks
… and content provider networks (e.g., Google,
Microsoft, Akamai ) may run their own network,
to bring services, content close to end users
… access
… access
net
access
net
net
access
access net
net
access
IXP access
net
net
ISP A
…
…
Content provider network
access IXP access
net ISP B net
access
ISP B
net
access
net
access
net regional net
access
… net
access access …
net access net
net
Internet structure: network of
networks
Tier 1 ISP Tier 1 ISP Google
to/from backbone
peering
… …
…
…
…
to/from customers
Protocol “layers”
Networks are complex,
with many “pieces”:
• hosts Question:
• routers is there any hope of organizing
• links of various structure of network?
media
• applications …. or at least our discussion of
• protocols networks?
• hardware,
software
Organization of air travel
• a series of steps
Layering of airline
functionality
ticket (purchase) ticket (complain) ticket
airplane routing airplane routing airplane routing airplane routing airplane routing
switch
destination Hn Ht M network
M application
Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Network security
• field of network security:
• how bad guys can attack computer networks
• how we can defend networks against attacks
• how to design architectures that are immune to attacks
• Internet not originally designed with (much) security in mind
• original vision: “a group of mutually trusting users attached to a
transparent network”
• Internet protocol designers playing “catch-up”
• security considerations in all layers!
Internet history
1961-1972: Early packet-switching
principles
• 1961: Kleinrock - queueing • 1972:
theory shows effectiveness • ARPAnet public demo
of packet-switching • NCP (Network Control Protocol)
• 1964: Baran - packet- first host-host protocol
switching in military nets • first e-mail program
• 1967: ARPAnet conceived by • ARPAnet has 15 nodes
Advanced Research Projects
Agency
• 1969: first ARPAnet node
operational
Internet history
1972-1980: Internetworking, new and proprietary
nets
• 1970: ALOHAnet satellite network Cerf and Kahn’s internetworking
in Hawaii principles:
• minimalism, autonomy - no
• 1974: Cerf and Kahn - architecture internal changes required to
for interconnecting networks interconnect networks
• best effort service model
• 1976: Ethernet at Xerox PARC • stateless routers
• late70’s: proprietary architectures: • decentralized control
DECnet, SNA, XNA define today’s Internet
• late 70’s: switching fixed length architecture
packets (ATM precursor)
• 1979: ARPAnet has 200 nodes
Internet history
1980-1990: new protocols, a proliferation of
networks
• 1983: deployment of TCP/IP • new national networks:
• 1982: smtp e-mail protocol Csnet, BITnet, NSFnet,
defined Minitel
• 1983: DNS defined for name-
• 100,000 hosts connected
to-IP-address translation to confederation of
networks
• 1985: ftp protocol defined
• 1988: TCP congestion control
Internet history
1990, 2000’s: commercialization, the Web,
new apps
• early 1990’s: ARPAnet late 1990’s – 2000’s:
decommissioned
• 1991: NSF lifts restrictions on • more killer apps: instant
commercial use of NSFnet messaging, P2P file sharing
(decommissioned, 1995)
• network security to
•
early 1990s: Web
• hypertext [Bush 1945, Nelson forefront
1960’s] • est. 50 million host, 100
• HTML, HTTP: Berners-Lee
• 1994: Mosaic, later Netscape million+ users
• late 1990’s: commercialization • backbone links running at
of the Web
Gbps
Internet history
2005-present
• ~750 million hosts
• Smartphones and tablets
• Aggressive deployment of broadband access
• Increasing ubiquity of high-speed wireless access
• Emergence of online social networks:
• Facebook: soon one billion users
• Service providers (Google, Microsoft) create their own networks
• Bypass Internet, providing “instantaneous” access to search, emai, etc.
• E-commerce, universities, enterprises running their services in “cloud” (eg,
Amazon EC2)
covered a “ton” of material! you now have:
• Internet overview • context, overview, “feel” of
• what’s a protocol? networking
• network edge, core, access network
• packet-switching versus circuit-
• more depth, detail to follow!
switching
• Internet structure
• performance: loss, delay,
throughput
• layering, service models
• security
• history
Module I: Introduction to computer network Basics, Computing Services, Servers, Data bases,
Networking software, analytics and intelligence, interconnection of peering points, Autonomous
systems.
Module II: Cloud formation ubiquitous, convenient on demand network access of pooled resource
creation, configuration, customization.
Module III: Models of Cloud: Public, Private and Hybrid Clouds, and service models - Infrastructure
as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)methods and
technology used.
Module IV: Cloud virtualization: Hardware /Software /Data servers, Networks infrastructure.
Module V: Service providers and their role infrastructure creation/support, security and
Administration
Module VI: Use cases and resource Provisioning Oracle cloud infrastructure configuration and
management
Text Books
1. Cloud Computing Principles and Paradigm, Rajkumar Buyya, James Broberg, Andrzej Goscinski,
Wiley Publishers.2011
Reference Books
1. Barrie Sosinsky, - Cloud Computing Bible|| John Wiley & Sons, 2010
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, - Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance, O'Reilly 2009
3. Cloud Computing: A Practical Approach, Toby Velte, Anthony TVelte, Robert Elsenpeter,
52
McGrawHill,2009
Form Desktop application to Hosted
Application
Desktop Application – Installation-
Application Specific User Owned
Replaced by
Software maintenance is reduce as taken care
by providers
Cloud Infrastructure helps eliminate the traditional IT
infrastructure
Cloud Advantage and scaling
[Link] social gaming company
Failed to scale the IT infrastructure like Servers, access platform, networking resource
User response time increased – users switched away
Cuil -search engine -server failure to respond was
Animoto- photo+music =video with animation [Tempo of music >> picture motion speed
Animoto- photo+music =video with animation [Tempo of music >> picture motion speed
increased]
User experience is affected
Offered on facebook – scaled from 5 server to 5000 server on cloud
Cloud advantage -rededuency in infra
• 1. Cloud Computing
• 2. History
• 3. Characteristics
• 4. Model
73
What is Cloud
Computing?
• Cloud Computing is a general term used to describe a new class of network based
computing that takes place over the Internet,
• basically a step on from Utility Computing
• a collection/group of integrated and networked hardware, software and Internet
infrastructure (called a platform).
• Using the Internet for communication and transport provides hardware, software
and networking services to clients
• Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources (e.g., networks, servers,
storage, applications, and services)
• These platforms hide the complexity and details of the underlying infrastructure from
users and applications by providing very simple graphical interface or API
(Applications Programming Interface).
74
What is Cloud
Computing?
• In addition, the platform provides on demand services, that are
always on, anywhere, anytime and any place.
• Pay for use and as needed, elastic
• scale up and down in capacity and functionalities
• The hardware and software services are available to
• general public, enterprises, corporations and businesses markets
75
Cloud Summary
• Cloud computing is an umbrella term used to refer to Internet based
development and services
76
• In short we can say that
• Cloud computing is Internet-based computing, whereby shared
resources, software and information are provided to computers
and other devices on-demand, like the electricity grid.
• The cloud computing is a culmination of numerous attempts at
large scale computing with seamless access to virtually limitless
resources.
77
• The cloud symbol is typically used to represent the internet.
• Cloud computing is now commonly used to describe the delivery of
software, infrastructure and storage services over the internet.
• Users of the cloud can benefit from other organizations delivering
services associated with their data, software and other computing
needs on their behalf, without the need to own or run the usual
physical hardware (such as servers) and software (such as email)
themselves.
• Cloud computing is the next stage in the evolution of the internet, it
provides the means through which everything from computing power
to computing infrastructure, applications and business processes —
can be delivered to you as a service wherever and whenever you need
them.
78
Why use cloud computin
1. Reduce capex g?
costs and improve the predictability of on-going operating
expenses.
2. Enable your employees to work from anywhere.
3. Access your data anytime, without risks associated with physical storage since
this is managed by cloud providers.
4. Avoid complex disaster recovery planning; let cloud computing vendors take care
of this for you.
5. Access the same class of technology as your bigger, more established
competitors .
6. Let cloud computing vendors do your server maintenance for you, freeing up
your resources for more important tasks
7. Improve your document control, with all your files in one central location,
allowing everyone to work from one central copy .
79
HISTORY AND
EVOLUTION
• Cloud computing is one the most innovative technology of our time. Following is a
brief history of Cloud computing.
80
• EARLY 1960S:- The computer scientist John McCarthy, come up with concept of
timesharing, and enabling Organization to simultaneously use an expensive
mainframe. This computing is described as a significant contribution to the
development of the Internet, and a pioneer of Cloud computing.
• IN 1969:- The idea of an “Intergalactic Computer Network” or “Galactic Network” (a
computer networking concept similar to today’s Internet) was introduced by J.C.R.
Licklider, who was responsible for enabling the development of ARPANET (Advanced
Research Projects Agency Network). His vision was for everyone on the globe to be
interconnected and being able to access programs and data at any site, from
anywhere.
• IN 1970:- Using virtualization software like VMware. It become possible to run more
than one Operating System simultaneously in an isolated environment. It was possible
to run a completely different Computer (virtual machine) inside a different Operating
System.
• IN 1997:- The first known definition of the term “Cloud Computing” seems to be by
Prof. Ramnath Chellappa in Dallas in 1997 – “A computing paradigm where the
boundaries of computing will be determined by economic rationale rather than
technical limits alone.” 81
• IN 1999:- The arrival of [Link] in 1999 pioneered the concept of delivering
enterprise applications via simple website. The services firm covered the way for both
specialist and mainstream software firms to deliver applications over the Internet.
• IN 2003:- The first public release of Xen, which creates a Virtual Machine Monitor
(VMM) also known as a hypervisor, a software system that allows the execution of
multiple virtual guest operating systems simultaneously on a single machine.
• IN 2006:- In 2006, Amazon expanded its cloud services. First was its Elastic Compute
cloud (EC2), which allowed people to access computers and run their own applications
on them, all on the cloud. Then they brought out Simple Storage Service (S3). This
introduced the pay-as-you-go model to both users and the industry as a whole, and it
has basically become standard practice now.
• IN 2013:-The Worldwide Public Cloud Services Market totalled £78bn, up 18.5 per
cent on 2012, with IaaS (infrastructure-as-a-service) the fastest growing market
service.
• IN 2014:- In 2014, global business spending for infrastructure and services related to
the cloud will reach an estimated £103.8bn, up 20% from the amount spent in 2013
(Constellation Research).
82
What’s the Internet: “nuts and
bolts” view
PC • millions of connected mobile network
server
computing devices:
• hosts = end systems
wireless global ISP
laptop • running network apps
smartphone
home
network
regional ISP
communication
wireless
links
wired
links
links fiber, copper,
radio,
satellite
transmission
Packet
router rate: switches: institutional
forward packets
bandwidth
network
(chunks of data)
Creating a network app application
transport
network
data link
applications
network
data link
physical
clients:
• communicate with server
client/server
• may be intermittently connected
• may have dynamic IP addresses
• do not communicate directly with
each other
P2P architecture
• no always-on server
peer-peer
• arbitrary end systems directly
communicate
• peers request service from other
peers, provide service in return to
other peers
• self scalability – new peers bring
new service capacity, as well as
new service demands
• peers are intermittently connected
and change IP addresses
• complex management
Processes communicating
process: program running clients, servers
within a host client process: process that initiates
• within same host, two processes communication
communicate using inter-process server process: process that waits
communication (defined by OS) to be contacted
• processes in different hosts
communicate by exchanging aside: applications with P2P
messages architectures have client
processes & server
processes
Sockets
• process sends/receives messages to/from its socket
• socket analogous to door
• sending process shoves message out door
• sending process relies on transport infrastructure on other side of
door to deliver message to socket at receiving process
application application
socket controlled by
process process app developer
transport transport
network network controlled
link
by OS
link Internet
physical physical
Addressing processes
• to receive messages, process must • identifier includes both IP address
have identifier and port numbers associated with
process on host.
• host device has unique 32-bit IP • example port numbers:
address • HTTP server: 80
• Q: does IP address of host on which • mail server: 25
process runs suffice for identifying • to send HTTP message to
the process? [Link] web server:
• IP address: [Link]
• port number: 80
A: no, many processes can • more shortly…
be running on same host
Internet apps: application, transport
protocols
application underlying
application layer protocol transport protocol
• flow control
lo
network data link
gi
data link physical
ca
physical
• connection setup
l
network
en
data link
d-
physical
en
network
d
data link
tr
UDP
a
physical
ns
network
po
data link
r
• no-frills extension of “best-effort” IP
t
physical
network
data link applicatio
physical n
• bandwidth guarantees
Internet transport-layer
protocols
• reliable, in-order delivery (TCP) applicatio
n
transport
• congestion control network
data link
physical network
• flow control
lo
network data link
gi
data link physical
ca
physical
• connection setup
l
network
en
data link
d-
physical
en
network
d
data link
tr
UDP
a
physical
ns
network
po
data link
r
• no-frills extension of “best-effort”
t
physical
network
data link applicatio
IP physical
network
data link
n
transport
physical network
• delay guarantees
• bandwidth guarantees
Network layer
application
receiving host
data link
physical
network network
data link data link
• on sending side encapsulates network
data link
physical
physical physical
transport layer
data link data link
physical physical
network
data link
router
network transport
data link network network
network physical data link data link
physical
• router examines header fields in all IP
data link physical
physical
interface
[Link] = 11011111 00000001 00000001 00000001
223 1 1 1
IP addressing: introduction
[Link]
[Link]
[Link]
[Link]
a subnet [Link]
[Link]
[Link]/24
[Link]
[Link] [Link]
[Link] [Link]
[Link] [Link]
[Link] [Link]
subnet host
part part
11001000 00010111 00010000 00000000
[Link]/23
IP addresses: how to get
one?
Q: how does network get subnet part of IP addr?
A: gets allocated portion of its provider ISP’s address
space
Organization 0
[Link]/23
Organization 1
“Send me anything
[Link]/23 with addresses
Organization 2 beginning
[Link]/23 . Fly-By-Night-ISP [Link]/20”
.
. . Internet
.
Organization 7 .
[Link]/23
“Send me anything
ISPs-R-Us
with addresses
beginning
[Link]/16”
Hierarchical addressing: more specific
routes
ISPs-R-Us has a more specific route to Organization 1
Organization 0
[Link]/23
“Send me anything
with addresses
Organization 2 beginning
[Link]/23 . Fly-By-Night-ISP [Link]/20”
.
. . Internet
.
Organization 7 .
[Link]/23
“Send me anything
ISPs-R-Us
with addresses
Organization 1 beginning [Link]/16
or [Link]/23”
[Link]/23
IP addressing: the last word...
[Link]
[Link]
[Link]
[Link]
IP Terminology
• Network address the designation used in routing to send packets to
a remote network,
• for example, [Link], [Link], and [Link].
• Broadcast address used by applications and hosts to send
information to all nodes on a network.
• Examples include [Link], which is all networks, all
nodes; [Link], which is all subnets and hosts on
network [Link]; and [Link], which broadcasts to all
IP Addressing Scheme
IP address consists of 32 bits of information
IP address using one of three methods:
Dotted-decimal, as in [Link]
Binary, as in 10101100.00010000.00011110.00111000
Hexadecimal, as in 82 39 1E 38
Network Addressing
The network address uniquely identifies each network.
Every machine on the same network shares that network address as part of its IP
address.
In the IP address [Link], for example, 172.16 is the network address.
Network Address Range
The addresses between 224 and 255 are reserved for Class D and E networks. Class D is used
for multicast addresses and Class E for scientific purposes.
Practice Example
How many subnets? Since 192 are two bits on (11000000), the answer would be 2 2 –2=2.
How many hosts per subnet? We have 6 host bits off (11000000), so the equation would be 2 6–2=62 hosts
The following table shows the first three subnets, valid hosts, and broad cast addresses in a Class B [Link]
mask.
Module I: Introduction to computer network Basics, Computing Services, Servers, Data bases,
Networking software, analytics and intelligence, interconnection of peering points, Autonomous
systems.
Module II: Cloud formation ubiquitous, convenient on demand network access of pooled resource
creation, configuration, customization.
Module III: Models of Cloud: Public, Private and Hybrid Clouds, and service models - Infrastructure
as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)methods and
technology used.
Module IV: Cloud virtualization: Hardware /Software /Data servers, Networks infrastructure.
Module V: Service providers and their role infrastructure creation/support, security and
Administration
Module VI: Use cases and resource Provisioning Oracle cloud infrastructure configuration and
management
Text Books
1. Cloud Computing Principles and Paradigm, Rajkumar Buyya, James Broberg, Andrzej Goscinski,
Wiley Publishers.2011
Reference Books
1. Barrie Sosinsky, - Cloud Computing Bible|| John Wiley & Sons, 2010
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, - Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance, O'Reilly 2009
3. Cloud Computing: A Practical Approach, Toby Velte, Anthony TVelte, Robert Elsenpeter,
111
McGrawHill,2009
How Cloud Computing works?
112
• The fist building block of Cloud is infrastructure where the Cloud will be
implemented. It is a wrong assumption that environment should be virtualized,
but cloud is a way to request resource in on-demand way. If you have a solution to
provide resource in on-demand way on bare metal, then it is also a Cloud service.
This infrastructure supports different types of Cloud Service like IaaS, PaaS, SaaS
etc.
• To provide these services you need Operating System Service, which will be
charged with requested service.
• Business System Service (BSS) – This is mainly used to validate the request and
create the invoice for the consumed services. There are multiple metrics, which
are used to create the invoice like Number of users, CPUs, Memory, Storage, I/Os
usage hours/month etc.
113
• How Cloud computing works in reality
• For accessing Cloud services, first step is to register on Cloud service
provider portal and create an account. Now login into portal and you can
order your services though the Cloud service consumer area. These services
had been created by Cloud service provider. These services can be a simple
virtual machine (VM), some network component, an Application service or
any platform service etc.
• Business System Service (BSS)
• The Cloud provider will validate your request through Business System
Service (BSS), if the validation is OK (like Credit Card detail, Contract etc.),
Service provider will provide the requested service through Operating
System Service.
• To access these all service Cloud service provider will provide you a
credentials to access or make any request for service. Monthly invoice get
generate for services used by you.
114
Do you Use the Cloud?
Cloud Computing
Characteristics
Common Characteristics:
Essential Characteristics:
On Demand Self-Service
Broad Network Access Rapid Elasticity
Resource Pooling Measured Service
Adopted from: Effectively and Securely Using the Cloud Computing Paradigm by peter Mell, Tim 116
Grance
1. Shared / Pooled Resources:
117
3. On-Demand Self-Service:
. Completely automated
• Users abstracted from the implementation
• Near real-time delivery (seconds or minutes)
• Services accessed through a self-serve
web interface
5. Metered by Use:
Services are metered, like a utility
• Users pay only for services used
118
• Services can be cancelled at any time
API – Application configuration for new updates
No knowledge of networking resources
required.
Deployment Models
Public cloud
• Public cloud (off-site and remote) describes cloud computing where resources are dynamically
provisioned on an on-demand, self-service basis over the Internet, via web applications/web
services, open API, from a third-party provider who bills on a utility computing basis.
Private cloud
• A private cloud environment is often the first step for a corporation prior to adopting a public
cloud initiative. Corporations have discovered the benefits of consolidating shared services on
virtualized hardware deployed from a primary datacenter to serve local and remote users.
Hybrid cloud
• A hybrid cloud environment consists of some portion of computing resources on-site (on
premise) and off-site (public cloud). By integrating public cloud services, users can leverage cloud
solutions for specific functions that are too costly to maintain on-premise such as virtual server
disaster recovery, backups and test/development environments.
Community cloud
• A community cloud is formed when several organizations with similar requirements share
common infrastructure. Costs are spread over fewer users than a public cloud but more than a
single tenant.
Public Cloud – Host in public domain accessible to paying users (Amazon, Google, Microsoft etc)
Private – the cloud infra is operated solely for an organization; it may be managed by the organization
or a third party and may exist on the premise or off premise
Such cloud infra is underutilized in terms of CPU usage
1. Cost of overestimating the hardware need is much less than the risk of underestimating as due to
less IT infra the services may crash
2. Procurement time in hardware – networking- software deployment is more
Hardware Virtualization
Due to More resource usage , physical resource cannot be moved every time.
Deploy a virtualization layer like VMware ESXi, Microsoft hyberV, Xen
Popular cloud companies , Services and
Products
These stacks are contained inside virtual machine instances, which operate completely
isolated from each other.
High-performance server can host several virtual machine instances, thus creating the
opportunity of having customized software stack on demand.
This is the base technology that enables Cloud computing solutions delivering virtual server on
demands, such as Amazon EC2, RightScale, VMware vCloud, and others.
Together with hardware virtualization, storage and network virtualization complete the range
of technologies for the emulation of IT infrastructure.
Virtualization refers to the representation of physical computing resources in simulated form
having made through the software.
Layer of software (installed over active physical machines) is referred as layer of virtualization.
This layer transforms the physical computing resources into virtual form which users use to
satisfy their computing needs
VIRTUALIZING PHYSICAL COMPUTING RESOURCES
Computing devices like processor, primary memory, other resources like storage, network devices
(like switch, router etc.), the communication links and peripheral devices (like keyboard, mouse,
printer etc.)
Core computing resources a virtualized component can only be operational when a physical
resource empowers it from the back end.
For example, a virtual processor can only work when there is a physical processor linked with it.
Simulated devices produced through virtualization may or may not resemble the actual physical
components (in quality, architecture or in quantity)
Users get access to three processors while there is one physical processor in reality. Or, 32-bit
processor can be produced (in virtual form) from 64-bit actual physical processor.
Software for virtualization consists of a set of control programs.
- It offers all of the physical computing resources in custom made simulated (virtual) form which
users can utilize to build virtual computing setup or virtual computers or virtual machines (VM).
- Users can install operating system over virtual computer just like they do it over physical
computer.
- Operating system installed over virtual computing environment is known as guest operating
system.
- When virtualization technique is in place, the guest OS executes as if it were running directly on
the physical machine.
UNDERSTANDING ABSTRACTION
Virtualization can be defined as the abstraction of different computing resources like processor,
memory, storage, network etc.
Abstraction is the process of hiding the complex and non-essential characteristics of a system.
Through abstraction, a system can be presented in simplified manner for some particular use
after omitting unwanted details from users.
In cloud computing, resource virtualization which adds a layer of software over physical
computing resources to create virtual resources, acts as a layer of abstraction. This abstraction
makes it easier to offer more flexible, reliable and powerful service
MACHINE OR SERVER LEVEL
VIRTUALIZATION
The Layer of Virtualization
Set of control programs that creates the environment for the virtual machines
to run on. - provides the access to the system resources to the virtual
machines.
- controls and monitors the execution of the virtual machines over it.
1. Cost of overestimating the hardware need is much less than the risk of underestimating as due to
less IT infra the services may crash
2. Procurement time in hardware – networking- software deployment is more
Hardware Virtualization
Due to More resource usage , physical resource cannot be moved every time.
Deploy a virtualization layer like VMware ESXi, Microsoft hyberV, Xen
Hypervisor-Based Virtualization
Full Virtualization Approaches Para-Virtualization or OS-Assisted Virtualization
The virtualization management task is transferred from the hypervisor towards the guest operating systems. Normal
versions of available operating systems are not capable of doing this. They need special modification for this
capability inclusion. T his modification is called porting. Each guest OS is explicitly ported for the para-application
program interface (API).
Best known example of para virtualization hypervisor is the open-source Xen project which uses a customized Linux
kernel.
Hardware-Assisted Virtualization
Inspired by software-enabled virtualization, hardware vendors later started manufacturing devices
tailored to support virtualization.
Intel and AMD started this by including new virtualization features in their processors.
AMD-Virtualization (AMD-V) and Intel Virtualization Technology (Intel-VT) allows some privileged
CPU calls from the guest OS to be directly handled by the CPU.
These calls do not require to be translated by the hypervisors, eliminating the need for binary
translation or para-virtualization , only possible when specific combinations of hardware
components are used.
Many bare-metal hypervisors make use of this technology.
Hypervisors like Xen, Microsoft’s Hyper-V or VMWare ESXi Server can take the advantages of the
hardware-assisted virtualization.
OPERATING SYSTEM LEVEL VIRTUALIZATION: REMOVAL OF THE
HYPERVISOR
Operating system level virtualization (also called as system level virtualization)
- no hypervisor is used and the virtual servers are enabled by the kernel of the operating system of
physical machine
- the kernel of the OS installed over physical system is shared among all of the virtual servers
running over it.
- all of the virtual servers share a single kernel and same OS as
the parent system.
- create multiple logically-distinct user-space instances (virtual
servers) over a single instance of an OS kernel.
- known as Operating System Virtualization or Shared Kernel
Approach.
- Ex: FreeBSD’s jail, Linux VServer, OpenVZ
- All can run logically-distinct user-spaces on top of a single
kernel.
Software with UI to configure and provision VM for usage Private /False Cloud/ Fast
Cloud.
Share infrastructure and compliance cost
Hybrid – when private cloud is out of service it used the service of the
public cloud
Network Virtualization
- process of combining network resources and network functionality into a single, software-
based administrative entity called as a virtual network.
- two common forms of network virtualization are
Virtual device-based virtual network: virtualized devices form the network.
All virtual networking devices (including virtual computers, virtual switches, virtual routers etc.)
communicate using actual (non-virtual) network protocols such as Ethernet as well as
virtualization protocols such as the VLAN.
This is actual network virtualization where the network is formed with all virtual components.
Protocol based virtual network: Rather than virtualizing devices, it creates virtual area
network.
Virtual LAN (VLAN) and virtual private network (VPN) are examples of such virtualizations.
Are logical local area networks (logical LANs) where the underlying physical LAN’s structure is
something else.
Several physical LANs which are actually part of public network (such as the Internet) can
function as a single logical LAN.
Enables network devices (such as computers and switches) to send and receive data across
shared or public networks as if they are part of a private network. The devices can
Storage Virtualization
In computing system, the storages have always been directly linked with the physical servers
traditional,
Now virtualized storage systems are linked with servers and actual (physical) storage systems
remain hidden.
Like other computing resources, virtualization of storage also happens through layer of
software which creates logical abstraction of the pooling of physical storage devices having
linked together by network.
Data stored in logical (virtualized) storage devices ultimately get stored in some physical
storage disks.
The advent of Storage Area Networks (SAN) has made the pooling (and hence the
virtualization as well) of physical storage systems easier.
There are many commercial virtualized cloud storage systems available in the market.
Ex: Google Cloud Storage,
Microsoft’s Azure Storage,
Amazon Simple Storage System (S3)
Amazon Elastic Block Store (EBS)
Desktop Virtualization
Advantages
Better physical security
No special favor to any on entity
Better auditing for security
Clouds have consistent API across service USA Patriotic Act law can check to data stored
and regions
Singapore is encouraging safe data storage
Cloud security is solvable issue
Things to watch
- Security privacy
- Billing can some timed be complex
- Costing is totally in the hands of the
provider
Things to remember
Module I: Introduction to computer network Basics, Computing Services, Servers, Data bases,
Networking software, analytics and intelligence, interconnection of peering points, Autonomous
systems.
Module II: Cloud formation ubiquitous, convenient on demand network access of pooled resource
creation, configuration, customization.
Module III: Models of Cloud: Public, Private and Hybrid Clouds, and service models - Infrastructure
as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)methods and
technology used.
Module IV: Cloud virtualization: Hardware /Software /Data servers, Networks infrastructure.
Module V: Service providers and their role infrastructure creation/support, security and
Administration
Module VI: Use cases and resource Provisioning Oracle cloud infrastructure configuration and
management
Text Books
1. Cloud Computing Principles and Paradigm, Rajkumar Buyya, James Broberg, Andrzej Goscinski,
Wiley Publishers.2011
Reference Books
1. Barrie Sosinsky, - Cloud Computing Bible|| John Wiley & Sons, 2010
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, - Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance, O'Reilly 2009
3. Cloud Computing: A Practical Approach, Toby Velte, Anthony TVelte, Robert Elsenpeter,
170
McGrawHill,2009
Cloud Storage Services (RAID Array )