CHAPTER 2 THEORETICAL FOUNDATION

Size: px
Start display at page:

Download "CHAPTER 2 THEORETICAL FOUNDATION"

Transcription

1 CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should understand the concept of virtualization first. They are indeed two different technologies, but they are also similar one to another. Therefore, in this chapter, the author would like to discuss the details about cloud computing, that is divided into three sections, characteristics, categories, and attributes, as well as the main objective of this thesis, what is multitenant environment and what are the risks of it. The author would like also to explain about the foundation of cloud computing, which is virtualization and three different types of virtualization, as well as the example of virtualization, virtual machine, and the main component in doing virtualization, which is hypervisor. The last thing that the author would like to discuss is Proxmox OS, in which will be used by the author to demonstrate the testing in this project. The author of this thesis is hoping that these explanations of unusual terminologies that will be used quite often in the thesis will help the readers to be able to understand the theories, concepts, and the whole ideas behind them Cloud Computing Cloud computing has become the most discussed topic recently in technology world. Basically, cloud computing can be defined as an environment that people can use the technology as they need it, as long as they need it, and pay as their

2 usage, without involving any installation on their own desktop. Cloud can only work as long as there is an internet connection. Therefore, a fast and reliable internet connection is a crucial element in order to use the cloud. Figure 1 - The Cloud Computing Adoption Model [8] By looking at the figure above, it shows the cloud computing adoption model, in which it displays the levels of adoption starting from the general to the detail. The first level, which is Virtualization, is the basis of cloud computing. Virtualization is most likely connected to hypervisor, in which it is used to divide server so it can be used to install multiple OSs. Virtualization is also coordinating applications, so it can work properly with multiple virtual images [8]. The second level is Cloud Experimentation, which is in order to succeed in cloud computing world, people need to have knowledge on this field. The knowledge is gathered by doing experimentation in cloud, and by then people can have the experience by doing so. The experience and knowledge are needed

3 in order to progress to the next level. The third level is the Cloud Foundations, and in this level basically people should establish the foundation for creating the application, a platform that will be used to manage the virtualized applications [8]. This level is compulsory, so people will have a strong foundation first, before going to the next level. The fourth level is the Cloud Advancement, in which at this stage people should be ready to implement their own cloud or use the public cloud available on the internet. The virtualized applications on the previous level should also be implemented and ready to use. Finally, the last level of the cloud adoption model is the Cloud Actualization: Hypercloud. On this level, the usage of cloud technology will be at its maximum performance. Maximum performance can be defined as a fully-dynamic and autonomic computing environment, in which the application workload can be distributed equally among the cloud servers [8]. The aim for this level is to get a comparative cost advantages rather by using traditional model. In other words, cloud computing is an approach to deliver services, while virtualization is the service itself [9]. When virtualization is basically one physical computer that virtualized into many computing environments, but on the other hand, cloud computing is many different computers that pretending to be one computing environment. Therefore, the author can conclude that cloud computing and virtualization are two different things, but they are closely related to each other.

4 Characteristics Characteristics are what make something distinct from the others. In computing world, it is important to have a well-distinct characteristic, so the technology proposed can be stood out in the market. In this case, cloud computing also has two characteristics that differentiate it from other technology. 1. The ability of inter connectivity of computer servers the user will be able to carry out a variety of tasks in different locations [10]. Meaning that, as long as the user have internet connection, an access to the system is still possible no matter the location of the user or where the system is hosted. 2. Allows for the outsourcing of a key element of the company s work - When dealing with an IT department, a huge amount of budget is sometimes needed in order to implement a good system in one company. One way to reduce the cost for developing IT system is by having a cloud computing system [10]. The system can be relocated to a cheaper environment, in which the cost of hardware, service, and other cloud related resources, are lower than the resources in the current location. Therefore the budget saved from having a cloud computing system can be allocated into another department that needs it.

5 Categories Since the term cloud computing is so broad, a categorization takes place in order to divide the scope specifically. Cloud computing can be divided into three categories based on the service that the vendors provide. The categories are Software-as-a-service (SaaS), Infrastructure-as-a-service (IaaS), and Platform-as-a-service (PaaS), as shown in the figure below. Figure 2 - Cloud Service Models [11] Software-as-a-service (SaaS) SaaS can be defined as a web-based software deployment model that makes the software available through a web browser [12]. In other words, the vendors of this service is renting the software on the internet, so people can use it and pay for what they have used. As the user of this service, people will not need to worry about the cost for buying the application, the compatibility of operating

6 system, or even the language that is used to write the application. The user can put aside those attributes and start to use the application on the cloud. Gmail, YahooMail, and Hotmail are the examples of SaaS in terms of an program. People can access the mail server from those companies, without the need to install any software. They just need to have a web browser and internet connection to access the . It is different when compared to Microsoft Outlook or Apple Mail, even though it provides the same functionality as an program. The users of these applications will be required to install the software itself Infrastructure-as-a-service (IaaS) IaaS provides computing resources (e.g. server, routers, processing power, network bandwidth, and storage) as the service [11]. In other words, the users can rent resources from the IaaS vendors, rather than buy it, in which it will cost much more. When the customers buy this service, they will only pay for what they had used, no less and no more. By using the IaaS, customers will gain two benefits from it. The benefits are: 1. In terms of cost, since the customers are only paying for the resources that they actually used or consumed [11], the

7 cost will be lower compared to the traditional computing, in which customers need to pay a fixed amount no matter if they use it or not. 2. In terms of elasticity, while using cloud, the customers can control the number of resources that they are willing to use at any given time [11]. Based on their own computing requirements and configuration, the IaaS provider can respond to quickly scale up or down the resources. Therefore, when the traffic is at high, the customers can contact the provider to scaled up the capacity in order to manage the huge traffic at that time, and when everything goes back to normal, it can be scaled down up to its original position. GoGrid and ReliaCloud are the example of IaaS vendors [13]. GoGrid is a company that offering Windows and Linux cloud servers, elastic hardware load balancing (it divides the internet traffic across two or more web servers [14]), and cloud storage. On the other hand, ReliaCloud is offering cloud servers and storage resource Platform-as-a-service (PaaS) The term platform itself means a base for creating something. In this case, PaaS vendors will provide the customer with the infrastructure, and a complete operational and development

8 environment for the deployment of the applications [12]. By having this service, the customers should not worry anymore about how their data centers should be housed, what hardware are needed to build a data center, or even the high cost of electricity for having a huge data center followed by the systems to keep it nice and cool, and not overheat. However, there is a downside in using PaaS. When the user wants to use this cloud service, the user need to write the code in the vendor s specified language [12]. The most well-known PaaS is Google App Engine and Windows Azure. In order to use the Google App Engine, users need to write the applications in Phyton in the Google s development frameworks. On the other hand, when users want to create an application using Windows Azure, they need to write it in Microsoft based programming language [15], i.e..net, or Microsoft Visual Studio s language, i.e. Java, PHP, and jsp Attributes There are five attributes of cloud computing that people can see and analyze on how strong a cloud service can be to the cloud computing model [16].

9 Service Based Cloud service provided by the vendors can be categorized as an off the shelf, because the service is created to fulfill the specific needs of the customers, and therefore the technologies are designed to fulfill those needs Scalable and Elastic The service is scalable and elastic, because it can scale up or down the capacity as the customer demands. Different times will be having different connection traffics. In busy hours for example, the traffics are much higher than usual hours, therefore the customers can decide to scale up the capacity of the resources that they used to manage the traffic going into the server. While in usual hours, the capacity can be scaled down, so the customers will not need to pay for resources that are not being used Shared The software, infrastructures, or platforms that are offered by the vendors are shared among the customers of the service. Therefore, the unused resources will be able to serve multiple needs for multiple customers simultaneously Metered by Use The services provided by the vendors are being tracked down with usage metrics to enable multiple payment models. One example

10 of the model is pay-as-you-go plan, in which customers will only need to pay based on their usage (amount of the service used, hour(s) of usage, how much data transfer), and not on the cost of the equipment Uses Internet Technologies There will be no cloud computing if there is no internet connection. Internet is the crucial factor that a cloud computing can be established. Without an internet connection, there is no way a user can access the system Multi-tenant Environment In cloud environment, vendors are sharing the software, infrastructures, and platforms to be used by multiple customers using internet connectivity. The physical server is still one machine, but it can provide services to multiple customers, this is what people called a multi-tenant environment. In IaaS, customers or tenants are sharing infrastructure resources (e.g. servers, hardware, and storage), while in SaaS, tenants are sourcing the same application, which means that multiple tenants will be most likely to stored their data in the same database [17]. Therefore, a security and complete isolation has become the major concern for this multi-tenant environment. There is a risk that the tenants might pose one to another within the same vendor, and this is a very critical flaw that multi-tenant environment have.

11 2.1.3 Virtualization or Virtual Technology As the author has mentioned in the previous, virtualization is acting as the basis for cloud computing, therefore in order to get to know the concept of cloud computing, the reader should also understand the concept of virtualization. Virtualization can be defined as dis-associating the tight bond between software and hardware. While in the traditional world of technology, different server s operating system will be required to use its own server [18]. In other words, there will be a lot of servers that people need to manage due to the variants of server s OSs available in the market. This condition will result in some negative effects, such as: it will consume more electricity power, waste resources, and if it has reached its maximum capacity, the owners is rather scale it up (more memory or processors) or scale it out (more servers). However, by had discovering virtualization technology, the ability to dis-associate the bond of software and hardware meaning that people can use the same hardware while having different software servers. The idea of this technology is to allow for a multiplicity of access points from a single outlet. The outlet can be in form of physical server, memory, or even computers itself. Virtualization has one crucial element to gain control of the overall system, which is the central command unit will be able to supervise the activities that are being done on outpost computers [19]. Therefore, once the central has found out a misbehave computer, it will be detected and the supervisor can check and fix the problem.

12 Virtualization can be categorized into three types based on the object that is been virtualized. The categories are hardware or server, desktop, and storage virtualization Hardware or Server Virtualization This type of virtualization is the most common and used in IT departments of a company. The virtualization takes place on the server s hardware, in which it partition the physical server into any number of virtual servers that allows running different OSs on their allocated memory, CPU, and disk footprints [12]. VMware, Microsoft, and Citrix are the three established companies that are experts in doing the server virtualization. There are some advantages in doing server virtualization. 1. In terms of hardware utilization, the cost that are needed to buy a new hardware/server can be reduced since all different types of OS can be run on a single physical server, and also the energy that can be saved by only having one server compared to multiple servers. 2. In terms of security, clean images can be used to restore the current system, and also by using virtual machines, it can provide sandboxing (a technique for creating a confined execution environments that can be used to run untrusted programs [20]) and isolation to limit the attacks from outside parties [21].

13 Therefore, by having virtualization, it will make the system much safer, because it is running under a complete isolation, or even when the system has already been affected by malware, the users can restore it to the latest images that they have and it will go back normal again. 3. In terms of development, debugging and performance monitoring scenarios can be easily done by having images that can be used to rewind the process if anything goes wrong or error. It is much more convenient to have images to rewind the process, rather than try to find the problem and fix it, in which it will take much more time. There are also some disadvantages by using this type of virtualization. 1. In terms of administration, even though the number of physical server is less, but the number of virtual machines can be a lot [22]. Therefore, the administrator would need to have the ability to deal with many OS when doing the setting and maintenance. It requires more training and education to be able to run this virtualization smoothly. 2. In terms of licensing, when people are running three copies of Windows on a single machine, it may require to have three separate licenses, because many software-licensing do not take virtualization into account [22]. Therefore, even though users can divide a single machine into many OSs, they still need to pay for

14 the OSs license, in which it will be expensive. If the OS is an open source, the users should be worried that the OS is not safe, and might be attacked by the hackers. 3. In terms of performance, to be having a full potential of virtualization, powerful processors should be installed in the virtual machines [22]. It is fine to use ordinary processors just like other usual servers, but it will not expose the potential of virtualization, because the system will run slower compared to the normal one, since the processor is divided into several OSs Desktop Virtualization In these days, the rapid growth of business world is requiring a quick and efficient workplace that the employees need to be having. It is essential, because the more productive an employee, the more profit that the company will get. Therefore, desktop virtualization comes in handy. Desktop virtualization is the act of putting the different computing layers, and store some or all of them in a data center [23]. By using this technology, it allows the administrator to store the application centrally and stream it to a desktop based on user access. The work flow will be much more efficient and productive, compared to the traditional system where every computer is a stand-alone PC.

15 There are some advantages in doing desktop virtualization. 1. In terms of flexibility, users of this type of virtualization will have a huge advantage in terms of flexibility. They can access their own virtualized desktop from anywhere via LAN or WAN, and at any time. If for example a user is in the middle of a meeting, yet the user is forgetting one important data. Rather than going out the meeting room and get the data using flash disk, the user can connect to his/her desktop environment, and stream the data into the current computer. 2. In terms of security, as the system is centralized, all security applications, i.e. antivirus, firewall, and intrusion detection/prevention system, can be applied on the data center and easily managed by the administrator [24]. It is much easier rather than install and applying security applications in each and every computer that the company have. There are also the disadvantages using desktop virtualization. 1. In terms of licensing, the company still needs to buy the OS s licenses for each and every user. Therefore, there is no reduction in cost by doing desktop virtualization in licensing the software. 2. In terms of cost, the company needs to buy the desktop virtualization software, servers (if they do not have it currently), centralized storage infrastructure, and upgrade the network

16 bandwidth so the communication traffic will run smoothly [24]. All of these matters will cost a lot of money in order to fulfill the desktop virtualization plan, despite the fact that it will help the company to be more productive than before Storage Virtualization Storage has become an important part of computer system. The main purpose of storage device is to save data or files into the computer for later purpose. It is also to provide memory space for applications and software that is installed in the computer. Storage virtualization can be defined as an act of hiding the complexity of internal functions of a storage services or devices from the applications [25]. Meaning that, rather than having different layers of storage devices, i.e. disks, tapes, and optical devices, the virtualization will hide these layers and convert it into one group of storage, so by the time the applications want to read or write into the storage, it will be read or written in one single pool of storage Hypervisor The main component that can make virtualization happened is named hypervisor. Hypervisor is also called a Virtual Machine Manager or VMM. Hypervisor is a hardware virtualization technique that allows multiple guest OSs to run under one single host system simultaneously. Hypervisor will then allocate the resources of the host computer to be shared among those guest OSs depending on each of the OS requirement [26]. Therefore, hypervisor plays a big role in virtualization technology. Without the resources allocation done by the

17 hypervisor, guest OSs will not be able to operate, because they have insufficient resources Virtual Machine A virtual machine (VM) is an isolated software environment that can run its own operating systems and applications inside the host computer [27]. Meaning that VM is acting like a physical computer, in which it has its own CPU, RAM hard disk, and network interface card (NIC), but actually it is a software that is installed inside a host computer. VM will think that it is a real computer, because the operating system cannot tell any difference between a VM and physical machine. By implementing virtual machine into the system, there are some benefits that the user might get. 1. In terms of isolation, even though the VM is running inside a single computer, they are remain completely isolated from the host system as if there are two different physical machines. Also when there is a failure on one of the virtual machine, it will not affect the other virtual machine or the host computer. 2. In terms of ease of testing, VM is a portable and easy to manage software [28]. VM software has a feature called snapshot. This feature allows the user to save the current image of the system. Therefore, before the user install new application into the system, it is better to take a snapshot before the installation process, because when the application turns out an

18 error and affecting the whole system, the user can just rollback to the last snapshot taken Proxmox VE (Virtual Environment) OS Proxmox OS is an open source operating system that has been created by Proxmox Server Solutions GmbH in the year Basically Proxmox will be used as a platform for running virtual machines. It might looks similar to the other virtual machine creator, i.e. VMware. However, there are some features that the other vendor does not have. The features are: Container and Full Virtualization This feature is created to provide the maximum flexibility for the users when using the OS. The flexibility will be in terms of the performance and usability of the OS that will be installed inside the Proxmox. There are two categories for this feature, as follow: Container Virtualization (OpenVZ) OpenVZ is able to create multiple secure and isolated containers. Each container will perform just as a traditional server, meaning that it can be rebooted, has root access, IP addresses, memory, configuration files, and applications [29]. This category is the most suitable for running Linux servers, i.e. Ubuntu, Debian, and Fedora.

19 Full Virtualization (KVM) KVM stands for Kernel-based Virtual Machine. It is a full virtualization solution on x86 hardware, in which it had the virtualization extensions, i.e. Intel VT or AMD-V CPU [29]. For each and every KVM, they will have their own private virtualized hardware, for example: network card, hard disk, memory, and graphics adapter. KVM is suitable for installing Windows Operating Systems Central Web-based Management In order to manage the whole servers installed in Proxmox, the admin can use a web-based application just in one place. Therefore, there is no need for the admin to open different servers application just to monitor or configure it. The admin can just open up the web browser installed in a computer, then type in the IP addresses of the virtual machines. The communication line between the admin s computer and the virtual machines will be via SSL (Secure Socket Layer) encryption, therefore the communication line will be secure Cluster and Live Migration Clustering in Proxmox meaning that the admin can install as many servers as he/she like, in which it will be represented in nodes, and make it into one cluster where there is one master node and the other will become the child node. The control and configuration will be under the

20 master node fully. Therefore, the admin will not have difficulties to manage multiple servers at once. Another important feature in Proxmox is the live migration function. The migration will be used to move one virtual machine from one node to another node. The migration is important in order to keep each and every server running smoothly, meaning that the amount of hard disk and memory is not fully occupied, or the workload of the server is not overloaded. There are two types of migration, as follow: Live/Online Migration: the migration takes place when the virtual machine is still on Offline Migration: the migration takes place when the virtual machine has been turned off System Implementation In order to make the multi-tenant architecture secure and isolated one from the others, there are some key components that need to be followed. The components are access policies, application deployment, and data access and protection [30].

21 Access Policies In order to maintain data confidentiality and isolation within one multitenant architecture, a policy regarding which tenant can and should be only accessing which volume is needed. Otherwise, every tenant in that physical machine might be able to access the other tenant s data. Figure 3 - User Access Policies [30]

22 Application Deployment Fully Isolated Business Logic In this approach, the tenant will be given a single physical server to be used for their own purposes. It means that each tenant will have their own isolated environment, and simply separated from the other tenant s server. Figure 4 - Fully Isolated Business Logic [30] Virtualized Application Servers In this type of application deployment, the tenant will share a single application server, but given a single virtual machine for each of the tenant. Therefore, every process will be taken place inside that particular virtual machine, under the same application

23 server. By sharing the application server, the problem of multitenancy might be occurred. There is a risk that the data being processed can be swapped within the tenants, because all of the processes are being processed inside the same server. Figure 5 - Virtualized Application Servers [30] Shared Virtual Servers This type of application deployment is slightly different with the previous one, which is Virtualized Application Servers. The only difference is that in this type, there is only a single virtual machine up and running to be used by both of the tenants. With this type of application deployment, the problem of multi-tenancy can be occurred at both the virtual machine, and/or the application server, similar to above. Since it is running under the same virtual machine, there is a risk that the interface that each tenant see is not belong to that particular tenant, or even the risk in login

24 problem, for example, when Tenant 1 login into the system, but suddenly, the page of Tenant 2 that is appearing on the screen. This risk can be happening due to the isolation failure or the software bug. Figure 6 - Shared Virtual Servers [30] Shared Application Servers The last application deployment is by using a shared application server for all of the tenants. Meaning that, all of the tenants will be using only one application server, and execute their own programs using different sessions or threads. Each and every tenant will be given a unique session ID, that will be used to uniquely identifies the tenant inside that application server. The mechanism is similar in accessing website. When Tenant 1 wants to login into the system, the server will give the session SID01 to the tenant. The server will be identifying Tenant 1 by using that session SID01.

25 Figure 7 - Shared Application Servers [30] Data Access and Protection All of the data inside a cloud computing will be saved into a database. The structure of the database implementation may vary. There are three ways to manage the data inside a multi-tenant environment, as shown in the figure below. Figure 8 - Three Approaches to Managing Multi-Tenant Data [31]

26 Separate Database By having a separate database for each and every tenant, it is the best practice to implement the complete isolation in virtualization. Even though that the resources will be shared among the tenants, but each tenant has his/her own isolated area from the others. Therefore, it is the most secure database implementation compared to the other two approaches. However, the main drawback of this approach is the high hardware and maintenance costs and requirements will be needed to make sure that the system up and running. Figure 9 - Separate Database Shared Database, Separate Schemas Another approach is to having a same database for all of the tenants, but different schemas for each of the tenants. Schema in this case means a set of tables that is used by the tenant. The main drawback for this architecture is in the data recovery process. When there is a failure in the system, restoring the database will be dealing with all of the tenants data, regardless whether all of

27 the tenants have lost their data or just one tenant. In comparison with the separate database approach, the recovery process will only took place on that particular tenant s database, rather than everyone. Figure 10 - Shared Database, Separate Schema Shared Database, Shared Schema The final approach is using the same database and the same schema for all of the tenants in the cloud. In order to differentiate among the tenants, a new column is added into the table. The column will be the Tenant ID, in which each tenant will be given a unique ID that will represent that the row belong to the particular tenant. This approach has the lowest hardware cost,

28 because it only uses one database. In contrast, the security will be the main issue for this approach. Since the data will be saved in one schema inside one database, therefore there is no complete isolation for each tenant. Figure 11 - Shared Database, Shared Schema

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers

More information

LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING

LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING 2 WARNING The Hacker High School Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical

More information

The Art of Virtualization with Free Software

The Art of Virtualization with Free Software Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises

More information

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises

More information

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing

More information

Desktop Virtualization Technologies and Implementation

Desktop Virtualization Technologies and Implementation ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

Virtualization and Cloud Computing

Virtualization and Cloud Computing Written by Zakir Hossain, CS Graduate (OSU) CEO, Data Group Fed Certifications: PFA (Programming Foreign Assistance), COR (Contracting Officer), AOR (Assistance Officer) Oracle Certifications: OCP (Oracle

More information

Intro to Virtualization

Intro to Virtualization Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor

More information

9/26/2011. What is Virtualization? What are the different types of virtualization.

9/26/2011. What is Virtualization? What are the different types of virtualization. CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,

More information

2) Xen Hypervisor 3) UEC

2) Xen Hypervisor 3) UEC 5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Enomaly Elastic Computing Platform, * Service Provider Edition Executive Summary Intel Cloud Builder Guide

More information

Cloud Optimize Your IT

Cloud Optimize Your IT Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release

More information

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;

More information

Storage XenMotion: Live Storage Migration with Citrix XenServer

Storage XenMotion: Live Storage Migration with Citrix XenServer Storage XenMotion: Live Storage Migration with Citrix XenServer Enabling cost effective storage migration and management strategies for enterprise and cloud datacenters www.citrix.com Table of Contents

More information

Cloud computing an insight

Cloud computing an insight Cloud computing an insight Overview IT infrastructure is changing according the fast-paced world s needs. People in the world want to stay connected with Work / Family-Friends. The data needs to be available

More information

VIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS

VIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS VIRTUALIZATION 101 Brainstorm Conference 2013 PRESENTER INTRODUCTIONS Timothy Leerhoff Senior Consultant TIES 21+ years experience IT consulting 12+ years consulting in Education experience 1 THE QUESTION

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

View Point. Performance Monitoring in Cloud. www.infosys.com. Abstract. - Vineetha V

View Point. Performance Monitoring in Cloud. www.infosys.com. Abstract. - Vineetha V View Point Performance Monitoring in Cloud - Vineetha V Abstract Performance Monitoring is an integral part of maintenance. Requirements for a monitoring solution for Cloud are totally different from a

More information

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

Servervirualisierung mit Citrix XenServer

Servervirualisierung mit Citrix XenServer Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86

More information

Virtualization & Cloud Computing (2W-VnCC)

Virtualization & Cloud Computing (2W-VnCC) Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical

More information

How To Get The Most Out Of Redhat.Com

How To Get The Most Out Of Redhat.Com RED HAT ENTERPRISE VIRTUALIZATION AND CLOUD STRATEGY Aram Kananov EMEA Product Marketing Manager Platform and Cloud Business Units Red Hat 1 RED HAT BRINGS COMMUNITY, VENDORS, USERS TOGETHER 2 RED HAT

More information

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981! Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Virtualization. Jukka K. Nurminen 23.9.2015

Virtualization. Jukka K. Nurminen 23.9.2015 Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,

More information

Windows Server 2008 R2 Hyper V. Public FAQ

Windows Server 2008 R2 Hyper V. Public FAQ Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Virtual computers and virtual data storage

Virtual computers and virtual data storage Virtual computers and virtual data storage Alen Šimec, Ognjen Staničić Tehnical Polytehnic in Zagreb/Vrbik 8, 10000 Zagreb, Croatia alen@tvz.hr, ognjen.stanici@tvz.hr Abstract Virtual data storage represents

More information

Mobile Cloud Computing T-110.5121 Open Source IaaS

Mobile Cloud Computing T-110.5121 Open Source IaaS Mobile Cloud Computing T-110.5121 Open Source IaaS Tommi Mäkelä, Otaniemi Evolution Mainframe Centralized computation and storage, thin clients Dedicated hardware, software, experienced staff High capital

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services

More information

Cloud Models and Platforms

Cloud Models and Platforms Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model

More information

Emerging Technology for the Next Decade

Emerging Technology for the Next Decade Emerging Technology for the Next Decade Cloud Computing Keynote Presented by Charles Liang, President & CEO Super Micro Computer, Inc. What is Cloud Computing? Cloud computing is Internet-based computing,

More information

SECURITY IN OPERATING SYSTEM VIRTUALISATION

SECURITY IN OPERATING SYSTEM VIRTUALISATION SECURITY IN OPERATING SYSTEM VIRTUALISATION February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in

More information

CS 695 Topics in Virtualization and Cloud Computing. Introduction

CS 695 Topics in Virtualization and Cloud Computing. Introduction CS 695 Topics in Virtualization and Cloud Computing Introduction This class What does virtualization and cloud computing mean? 2 Cloud Computing The in-vogue term Everyone including his/her dog want something

More information

Installing & Using KVM with Virtual Machine Manager COSC 495

Installing & Using KVM with Virtual Machine Manager COSC 495 Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system

More information

Cloud Computing. Adam Barker

Cloud Computing. Adam Barker Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Cloud Computing - Architecture, Applications and Advantages

Cloud Computing - Architecture, Applications and Advantages Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral

More information

Virtualization and Cloud Computing

Virtualization and Cloud Computing Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the

More information

Cloud Computing Trends

Cloud Computing Trends UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered

More information

Competitive Comparison Between Microsoft and VMware Cloud Computing Solutions

Competitive Comparison Between Microsoft and VMware Cloud Computing Solutions Competitive Comparison Between Microsoft and VMware Cloud Computing Solutions Introduction As organizations evaluate how cloud computing can help them improve business agility, reduce management complexity

More information

Virtualization and Cloud Management Using Capacity Planning

Virtualization and Cloud Management Using Capacity Planning Research Report Virtualization and Cloud Management Using Capacity Planning Introduction The term virtualization refers to the creation of virtual machines, virtual networks and virtual disks (logical

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

An Introduction to Cloud Computing Concepts

An Introduction to Cloud Computing Concepts Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC ahmed.gamal.eldin@itida.gov.eg

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

PEPPERDATA IN MULTI-TENANT ENVIRONMENTS

PEPPERDATA IN MULTI-TENANT ENVIRONMENTS ..................................... PEPPERDATA IN MULTI-TENANT ENVIRONMENTS technical whitepaper June 2015 SUMMARY OF WHAT S WRITTEN IN THIS DOCUMENT If you are short on time and don t want to read the

More information

Design of Cloud Services for Cloud Based IT Education

Design of Cloud Services for Cloud Based IT Education www.jitae.org Journal of Information Technology and Application in Education Vol. 3 Iss. 3, September 2014 doi: 10.14355/jitae.2014.0303.03 Design of Cloud Services for Cloud Based IT Education Li Chao

More information

What is virtualization

What is virtualization Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

Control Tower for Virtualized Data Center Network

Control Tower for Virtualized Data Center Network Control Tower for Virtualized Data Center Network Contents 1 Virtual Machine Network Environment Analysis...3 2 "Control Tower" Must Have an Overall Picture of the Network...4 3 Virtual Machine Migration

More information

Building Blocks of the Private Cloud

Building Blocks of the Private Cloud www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

Contents. What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market

Contents. What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market Cloud Computing Contents What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market What is Cloud Computing? Definitions: Cloud computing

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

How Cloud Computing is Changing the Face of IT. Ketul Parekh HCSS

How Cloud Computing is Changing the Face of IT. Ketul Parekh HCSS How Cloud Computing is Changing the Face of IT Ketul Parekh HCSS Class Overview Cloud Technology and overview Cloud Computing trends, Cloud Adoption Drivers (and Inhibitors) Introduction to HCSS Cloud

More information

How cloud computing can transform your business landscape.

How cloud computing can transform your business landscape. How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about

More information

In a dynamic economic environment, your company s survival

In a dynamic economic environment, your company s survival Chapter 1 Cloud Computing Defined In This Chapter Examining the reasons for cloud Understanding cloud types Defining the elements of cloud computing Comparing private and public clouds In a dynamic economic

More information

VIRTUALIZATION THE FOUNDATION OF CLOUD COMPUTING

VIRTUALIZATION THE FOUNDATION OF CLOUD COMPUTING VIRTUALIZATION THE FOUNDATION OF CLOUD COMPUTING TM 989 Old Eagle School Road Suite 815 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Did You Know Approximately 70 percent of a typical IT budget in

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

DISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study

DISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study DISTRIBUTED SYSTEMS AND CLOUD COMPUTING A Comparative Study Geographically distributed resources, such as storage devices, data sources, and computing power, are interconnected as a single, unified resource

More information

CLOUD COMPUTING IN HIGHER EDUCATION

CLOUD COMPUTING IN HIGHER EDUCATION Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

Restricted Document. Pulsant Technical Specification

Restricted Document. Pulsant Technical Specification Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on

More information

Cloud Computing. Chapter 8 Virtualization

Cloud Computing. Chapter 8 Virtualization Cloud Computing Chapter 8 Virtualization Learning Objectives Define and describe virtualization. Discuss the history of virtualization. Describe various types of virtualization. List the pros and cons

More information

SCO Virtualization Presentation to Customers

SCO Virtualization Presentation to Customers SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,

More information

Cloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels.

Cloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels. Parallels Cloud Server White Paper An Introduction to Operating System Virtualization and Parallels Cloud Server www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating

More information

Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled

Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed

More information

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities

More information

Commercial Software Licensing

Commercial Software Licensing Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession

More information

Securing Cloud using Third Party Threaded IDS

Securing Cloud using Third Party Threaded IDS Securing Cloud using Third Party Threaded IDS Madagani Rajeswari, Madhu babu Janjanam 1 Student, Dept. of CSE, Vasireddy Venkatadri Institute of Technology, Guntur, AP 2 Assistant Professor, Dept. of CSE,

More information

CLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA)

CLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA) CLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA) Abhijeet Padwal Performance engineering group Persistent Systems, Pune email: abhijeet_padwal@persistent.co.in

More information

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software symon@5nine.com @SymonPerriman Paul Zinn Senior

More information

Private Distributed Cloud Deployment in a Limited Networking Environment

Private Distributed Cloud Deployment in a Limited Networking Environment Private Distributed Cloud Deployment in a Limited Networking Environment Jeffrey Galloway, Susan Vrbsky, and Karl Smith The University of Alabama jmgalloway@crimson.ua.edu, vrbsky@cs.ua.edu, smith102@crimson.ua.edu

More information

Private Cloud in Educational Institutions: An Implementation using UEC

Private Cloud in Educational Institutions: An Implementation using UEC Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,

More information

How To Create A Cloud Based System For Aaas (Networking)

How To Create A Cloud Based System For Aaas (Networking) 1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

Proactively Secure Your Cloud Computing Platform

Proactively Secure Your Cloud Computing Platform Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud

More information

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction CS 695 Topics in Virtualization and Cloud Computing and Storage Systems Introduction Hot or not? source: Gartner Hype Cycle for Emerging Technologies, 2014 2 Source: http://geekandpoke.typepad.com/ 3 Cloud

More information

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization

More information

Open Cloud System. (Integration of Eucalyptus, Hadoop and AppScale into deployment of University Private Cloud)

Open Cloud System. (Integration of Eucalyptus, Hadoop and AppScale into deployment of University Private Cloud) Open Cloud System (Integration of Eucalyptus, Hadoop and into deployment of University Private Cloud) Thinn Thu Naing University of Computer Studies, Yangon 25 th October 2011 Open Cloud System University

More information

Cloud Optimize Your IT

Cloud Optimize Your IT Cloud Optimize Your IT Windows Server 2012 Michael Faden Partner Technology Advisor Microsoft Schweiz 1 Beyond Virtualization virtualization The power of many servers, the simplicity of one Every app,

More information

Virtualization Overview. Yao-Min Chen

Virtualization Overview. Yao-Min Chen Virtualization Overview Yao-Min Chen The new look of computing 10/15/2010 Virtualization Overview 2 Outline Intro to Virtualization (V14n) V14n and Cloud Computing V14n Technologies 10/15/2010 Virtualization

More information

Desktop Virtualization. The back-end

Desktop Virtualization. The back-end Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers

More information

Managing Traditional Workloads Together with Cloud Computing Workloads

Managing Traditional Workloads Together with Cloud Computing Workloads Managing Traditional Workloads Together with Cloud Computing Workloads Table of Contents Introduction... 3 Cloud Management Challenges... 3 Re-thinking of Cloud Management Solution... 4 Teraproc Cloud

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

Paragon Protect & Restore

Paragon Protect & Restore Paragon Protect & Restore ver. 3 Centralized and Disaster Recovery for virtual and physical environments Tight Integration with hypervisors for agentless backups, VM replication and seamless restores Paragon

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Getting Familiar with Cloud Terminology. Cloud Dictionary

Getting Familiar with Cloud Terminology. Cloud Dictionary Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know

More information

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches

More information