The Building Blocks to the Architecture of a Cloud Platform
|
|
|
- Emily Williams
- 10 years ago
- Views:
Transcription
1 The Building Blocks to the Architecture of a Cloud Platform Promise. Mvelase, Nomusa. Dlodlo, David. MacLeod, and Happy. Sithole Abstract This research is on the identification of components that are general across cloud platforms. These components are classified under hardware, virtualisation and cloud management. These building blocks encompass nodes and clusters, hypervisors, virtual, billing and accounting, security and monitoring, to name but a few. Keywords Cloud Platforms, Hardware, Cloud Management, Virtualization T I. INTRODUCTION HERE are a number of definitions of the cloud. In [1] cloud computing is defined as follows: Cloud computing refers to both the applications delivered as services over the Internet and the hardware systems and software in the datacenters that provide those services. The services themselves have long been referred to as Software as a Service (SaaS). The datacenter hardware and software is what is called the Cloud. When a Cloud is made available in a pay-as-you-go manner to the public, it is called a Public Cloud; the service being sold is Utility Computing. The term Private Cloud refers to internal datacenters of a business or other organizations that are not made available to the public. Thus Cloud Computing is the sum of SaaS and Utility Computing, but does not normally include Private Clouds The National Institute of Standards and Testing (NIST) defines cloud computing under 5 identified characteristics as follows [2] on-demand self-service, which allows business units to get the computing resources they need without having to go through the IT department broad network access, which allows applications to be built in ways that align with how businesses operate today mobile, multi-device, etc. Promise.Mvelase is with the Meraka Institute (Centre for High Performance Computing), CSIR, Pretoria, South Africa: ; fax: ; [email protected]). Nomusa. Dlodlo, is with Meraka Institute (Internet of Things Engineering Group), CSIR, Pretoria, South Africa.( [email protected]). David.MacLeod is with the Meraka Institute (Centre for High Performance Computing), CSIR, Pretoria, South Africa. ( [email protected] ). Happy Sithole is with the Meraka Institute (Centre for High Performance Computing), CSIR, Pretoria, South Africa. ( [email protected] ). resource pooling, which allows for pooling of computing resources to serve multiple consumers rapid elasticity, which allows for quick scalability or downsizing of resources depending on demand measured service, which means that business units only pay for the computational resources they use. Its costs match business success Reference [3] gives the operating definition of cloud computing as: Cloud computing provides on-demand network access to a computing environment and computing resources delivered as services. There is elasticity in the resource provision for users, which is allocated dynamically within providers datacenters. Payment schemes are typically pay-as-you-go models. Cloud computing, according to [3] is a combination of a technical architecture and a business model. The computing environment and computing resources delivered as services is most usefully disaggregated into applications, platforms and infrastructure all delivered as services. Applications are the software for users, platforms are the programming languagelevel environment for developing applications and infrastructure can include processing power, storage and user configurable virtual. Delivered as services, these elements are accessed via networks with users typically charged by the amount of usage infrastructure elements are therefore virtualized. Reference [4] defines cloud computing as the dynamic provisioning of IT capabilities (hardware, software or services) from third parties over a network. McKinsey on the other hand says that clouds are hardware-based services offering compute, network and storage capacity: where hardware is highly abstracted from the buyer; buyers incur infrastructure costs as variable operating expenditures; and infrastructure capacity is highly elastic. Reference [5] conceives the cloud as: Clouds are a large pool of easily usable and accessible virtualized resources such as hardware, development platforms and/or services). These resources can be dynamically reconfigured to adjust to a variable load (scale), allowing also for an optimum resource utilization. This pool of resources is typically exploited by a pay-per-use model in which guarantees are offered by the infrastructure provider by means of customized SLAs. II. NODES AND CLUSTERS A cloud is made up of nodes and clusters. Nodes are physical servers. The nodes are connected to form a cluster. In 30
2 each cluster you have cloud software that manages the nodes in the cluster. Nodes in one and the same cluster have to be running the same software. Each cluster can operate independently of other clusters. Clusters in a cloud are managed by a central manager through one application programming interface (API). As shown in Figure 1, each cluster has a public IP and an internal IP. Machines inside the cluster are connected to the public interface via the internal machine IP. The cloud maintenance software decides if a new customer coming in would like to submit a job into the cloud, that is, deploy a virtual machine. On each node sits the real data and data in the form of virtual. The data may not only be on the nodes, but it could also be in the storage area network (SAN). A virtual machine is a software-based, fictive computer. Virtual may be based on specifications of a hypothetical computer or emulate the computer architecture and functions of a real world computer. Virtualization is the process of creating logical computing resources from available physical resources. This is accomplished using virtualization software to create a layer of abstraction between workloads and the underlying physical hardware. Native hypervisor Operating system hypervisor hardware Hosted hypervisor Fig. 2 Types of hypervisors Operating system hypervisor Operating system hatdware Durban cluster Central manager Pretoria cluster API Fig. 1 Nodes and clusters III. HYPERVISORS Customer deploys virtual machine Johannesburg cluster A hypervisor or virtual machine monitor (VMM) is a piece of computer software, firmware or hardware that creates and runs virtual. A computer on which a hypervisor is running one or more virtual is defined as a host machine. Each virtual machine is called a guest machine. The hypervisor presents the guest operating systems with a virtual operating platform and manages the execution of the guest operating systems. Multiple instances of a variety of operating systems may share the virtualized hardware resources. A hypervisor provides a virtual platform to run multiple operating system instances at once keeping each one of them unknown from one another. As said, a hypervisor partitions a physical server. There are two types of hypervisors: 1) the native or bare metal or hardware-based, and 2) the hosted or software-based (see Figure 2). The native or bare metal or hardware based hypervisor runs directly on the hardware of the physical server and has full control on that hardware so as to provide separate OS instances to the guest servers. An example of this type of hypervisor is VMware, XEN and Microsoft's Hyper-V. The so-created virtual server is separated from other VMs such that they are unaware that they are on the same 'parent server'. They are also called semi-dedicated servers and whatever the allocation is, in terms of hardware, its 'dedicated' allocation. With the hosted or software-based hypervisor, a preinstalled OS is required on the physical machine and so the control of the server is with the OS and not with the hypervisor. It includes VMware workstation, Microsoft Virtual PC and Parallels Workstation that are hosted on hypervisors. The most used hypervisors are either VMware or Hyper-V, though VMware is suggested and opted for by many users and companies as VMware provides good features and high level of scalability. With the new VMware Vsphere (vcloud) the cloud computing has become more common nowadays as the user can scale his server in the run-time without affecting uptime. Type 1 (or native, bare metal) hypervisors run directly on the host's hardware to control the hardware and to manage the guest operating systems (OS). A guest operating-system thus 31
3 runs on another level above the hypervisor. Type 2 (or hosted) hypervisors run within a conventional OS environment. With the hypervisor layer as a distinct second software level, guest operating-systems run at the third level above the hardware. The hosted hypervisor runs on another OS from the host, while the native hypervisor runs on the same OS. In virtualization technology, a hypervisor is a software program that manages multiple operating systems (or multiple instances of the same OS) on a single computer system. The hypervisor manages the system's processor, memory, and other resources to allocate what each operating system requires. To write to storage on a physical device, the hypervisor talks to storage. Hypervisors are designed for particular processor architecture and may also be called virtualization managers. The native hypervisor is preferred over the hosted since the physical OS and hypervisor are built into each other. The hosted hypervisor has an additional OS which might not necessarily be optimized in all cases. Various hypervisors have different features. Different hypervisors have other layers written on top of the hypervisor features which allow easy access. For example, a library of tools called LibVirt and VirtManager sit on top of the KVM hypervisor and also on the XEN hypervisor. These high level commands take away the specifics of particular hypervisor topography. The same commands in VirtManager and LibVirt can run on both KVM and XEN. KVM and XEN hypervisors don t cost anything as they are open source software. Companies however, make money through controlling the hypervisors in the management of virtual including installing software. In virtualization, a hypervisor is a software that servers as a mode of partitioning a physical server or host server into multiple OS based virtual servers or guest servers. A hypervisor is responsible to allocate resources (CPU, RAM, HDD) of the physical server or a dedicated Server among various virtual servers or virtual. IV. VIRTUAL MACHINE A virtual machine (VM) is a software implementation of a machine (i.e. a computer) that executes programs like a physical machine. Virtual are separated into two major classifications, based on their use and degree of correspondence to any real machine: A system virtual machine provides a complete system platform which supports the execution of a complete operating system (OS). These usually emulate an existing architecture, and are built with the purpose of either providing a platform to run programs where the real hardware is not available for use (for example, executing software on otherwise obsolete platforms), or of having multiple instances of virtual leading to more efficient use of computing resources, both in terms of energy consumption and cost effectiveness (known as hardware virtualization, the key to a cloud computing environment), or both. A process virtual machine (also, language virtual machine) is designed to run a single program, which means that it supports a single process. Such virtual are usually closely suited to one or more programming languages and built with the purpose of providing program portability and flexibility (amongst other things). An essential characteristic of a virtual machine is that the software running inside is limited to the resources and abstractions provided by the virtual machine it cannot break out of its virtual environment. The host OS runs on the hardware. The data on the hardware can only be manipulated by the host OS. On the host OS is the hypervisor software that mimics the hardware and becomes available to the virtual machine OS. This is associated with the type 2 hypervisor. This means that the virtual machine is not running on the physical hardware but on the hypervisor. Type 1 or native hypervisors run directly on the host's hardware to control the hardware and to manage the guest operating systems. A guest operating-system thus runs on another level above the hypervisor. This model represents the classic implementation of virtual-machine architectures. Command Line Interface Virtual machine OS Hypervisor HOST OS SunStone WebLine Interface CLOUD PLATFORM Amazon EC2 Interface Open Cloud Computing Interface Virtual machine OS Hypervisor HOST OS CPU Memory Storage Network CPU Memory Storage network Fig 3 Cloud platform The virtual machine OS takes space on the hardware when deployed, if type 2 is selected. Therefore space and random memory should be reserved on the node for the virtual machine to run, on type 2 hypervisors. The Cloud management infrastructure decides which physical node on the cluster to deploy the virtual machine (the hypervisor only provides virtualization). There is no human intervention as it is the software which makes decisions on which node and which cluster to deploy the virtual machine. Some cloud providers give the option for the customer to select where to deploy the virtual machine. They can only choose the cluster but not the node. This is decided by the software. If a cluster is overloaded, it is not made available to the customer. The interfaces such as Amazon EC2, Open Cloud Computing interface, Command line Interface and Sunstone WebLine 32
4 Interface afford communication with the cloud platform (see Figure 3). A. Virtual Local Area Network A virtual local area network (VLAN) is an isolated network on an Ethernet switch. Each VLAN in turn connects a number of physical. No unauthorized access is permitted to the VLAN except by the that are connected to the VLAN (see Figure 4). Virtual LANs are connected to one another via a switch. InfiniBand is a low latency L2 protocol. InfiniBand is a switched fabric computer network communications link used in high-performance computing and enterprise data centers. Its features include high throughput, low latency, quality of service and failover, and it is designed to be scalable. The InfiniBand architecture specification defines a connection between processor nodes and high performance I/O nodes such as storage devices. InfiniBand host bus adapters and network switches are manufactured by Mellanox and Intel Virtual Physical Virtual Physical Virtual Physical machine workload to exist independently on the same physical host and increasing the server s utilisation. Storage virtualisation - abstracts and pools the storage resources available within the data centre, and allows storage to be provisioned to workloads that require it. This reduces the incidence of lost or orphaned storage and increases storage utilisation. Mainly on a storage area network (SAN). Network virtualization - allows a large physical network to be provisioned into multiple smaller logical networks, and conversely allows multiple physical LANs to be combined into a larger logical network. This behaviour allows administrators to improve network traffic control, organisation and security. Desktop virtualization - runs a complete desktop instance on a centralised server rather than the individual desktop PC, and provides that instance to a remote endpoint such as a simple thin client. Centralising desktop instances in the data centre allows better manageability and security. Application virtualization - used to virtualize specific applications rather than entire desktop instances. The virtualized application is operated on a centralised server and streamed across the LAN or WAN to client users that need access to that application. Application and desktop virtualization are often used in tandem. Mobile virtualization - allows multiple instances to exist on a smartphone, tablet or other mobile device. Switch Fig. 4 Switch in VLANs V. VIRTUALIZATION Virtualization is the process of creating logical computing resources from available physical resources. This is accomplished using virtualisation software to create a layer of abstraction between workloads and the underlying physical hardware. Once installed, the virtualised computing resources such as memory, CPUs, network and disk I/O and storage can all be pooled and provisioned to workloads without regard for physical location within a data centre. Virtualization technology provides encapsulation that prevents workloads from accessing resources that are not assigned to it which allows a virtualised system to support multiple independent workloads simultaneously. Virtualisation is used to consolidate IT infrastructure, centralise system administration and management tasks, support workload scalability and agility and optimise the use of computing resources. This concept is the foundation of server consolidation, which has been the principal driver for virtualisation adoption. Virtualization technology includes: Server virtualization - abstracts the server s physical computing resources into logical entities that are provisioned to multiple workloads, allowing far more VI. BILLING/ACCOUNTING Billing is about accounting for usage of physical hardware and virtual resources. It is not necessarily for payment monitoring usage. It is possible to cater for software that allows connecting to some other accounting system. are not italicized). An excellent style manual and source of information for science writers is [9]. A general PSRCENTRE style guide, Information for Authors, is available at the web site. A. Billing in the Cloud One of the key attributes of cloud computing is the usage model. Customers consume resources as a service and pay only for what they use, rather than buying a license and annual maintenance. Regardless of whether the provider focuses on Infrastructure as a Service (IaaS), Platform as a Service (PaaS) or Software as a Service (SaaS), billing is the missing link. Cloud computing is based on a usage model where access to computing resources is delivered through Internet technologies. The user pays per usage, rather than buying a license and annual maintenance. Infrastructure costs (servers, DASD, network costs) are typically included in SaaS. B. Infrastructure as a Service Different hardware resources are provided through Infrastructure as a Service (IaaS).Charging model examples include the following: CPUs: CPUs are differentiated by power and number of CPU cores and, consequently, price. CPU power may be 33
5 differentiated by time zone, e.g., static (based on peak and off peak resources) or dynamic, where price is determined by demand at the time. An extreme example of this concept is a two-way negotiated price between buyer and seller. Server type: Because the same CPU can be deployed either in a low cost server or in a top-of-the-range server with high availability and a significantly different cost point, the customer price must reflect this variation. System administration: The same server type resource may be charged at a different rate depending on the operating system (e.g., Windows or Linux). This is highly unlikely though because the client must administer the system in IaaS. Storage (DASD): Different storage capacity (including mirroring) is available, as well as different types of storage reflecting different price points from disk storage suppliers. The same variability exists as in the case of CPUs. For example, the cost for 1GB will vary depending on whether it s provided in a low- or high-end unit. Disaster recovery: This involves the time window within which SaaS would need to be available should a disaster take out a data centre from which SaaS is provided. For short time window an active-active deployment in two data centres may be required. Other: Charges for space, power, network capacity, security, operating system and so on are built into the infrastructure pricing. Service level agreements (SLAs): If high availability is part of the agreement, SLAs may impact the price (e.g., refunds when contractual SLAs are not achieved). Billing for IaaS may be done based on the quantity and quality of the infrastructure resources provided. C. Platform as a Service PaaS includes software frameworks and the necessary hardware in which to develop and deliver Software as a Service (SaaS). Examples of such frameworks include the following: Different hardware architectures with different server sizes from small, Intel-based servers to mid- or top-range servers and mainframes utilizing different chips Various software operating systems (e.g., Windows, Linux, MAC OS, Solaris, z/os, and so on) Various development and application frameworks (e.g., Java,.Net) Solution stacks (e.g., LAMP, MAMP, WINS, and so on) Billing must take into account Infrastructure as a Service (IaaS) costs, as well as software features and product offerings provided in the PaaS layer. Different frameworks have different prices and may include different infrastructures. All of this, together with usage, needs to be taken into account. D. Software as a Service Software as a Service (SaaS) may be delivered as a single or multi cloud offering. An example of a single cloud offering is Unified Communications (UC), which consists of different modules. An example of a multi-cloud offering is one including UC and ERP clouds. The assumption is that the cloud provider deploys all third party products necessary to run such offerings into the cloud. VII. SECURITY IN THE CLOUD This section looks at ways of implementing cloud security and the dimensions of cloud security. A. Implementing Cloud security Cloud computing security (sometimes referred to simply as "cloud security") is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Cloud security is not to be confused with security software offerings that are "cloud-based" (a.k.a. security-as-a-service). Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers. In most cases, the provider must ensure that their infrastructure is secure and that their clients data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information. The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service. Virtualization alters the relationship between the OS and underlying hardware - be it computing, storage or even networking. This introduces an additional layer - virtualization - that itself must be properly configured, managed and secured. Specific concerns include the potential to compromise the virtualization software, or "hypervisor". While these concerns are largely theoretical, they do exist. For example, a breach in the administrator workstation with the management software of the virtualization software can cause the whole datacentre to go down or be reconfigured to an attacker's liking. 1. Access Control Cloud security architecture is effective only if the correct defensive implementations are in place. Efficient cloud security architecture should recognize the issues that will arise with security management. The security management addresses these issues with security controls. These controls are put in place to safeguard any weaknesses in the system and reduce the effect of an attack. While there are many types of controls behind cloud security architecture, they can usually be found in one of the following categories: 2. Deterrent Controls These controls are set in place to prevent any purposeful attack on a cloud system. Much like a warning sign on a fence or a property, these controls do not reduce the actual vulnerability of a system. 34
6 3. Preventative Controls These controls upgrade the strength of the system by managing the vulnerabilities. The preventative control will safeguard vulnerabilities of the system. If an attack were to occur, the preventative controls are in place to cover the attack and reduce the damage and violation to the system's security. 4. Corrective controls Corrective controls are used to reduce the effect of an attack. Unlike the preventative controls, the corrective controls take action as an attack is occurring. 5. Detective controls Detective controls are used to detect any attacks that may be occurring to the system. In the event of an attack, the detective control will signal the preventative or corrective controls to address the issue. 6. Dimensions of cloud security Correct security controls should be implemented according to asset, threat, and vulnerability risk assessment matrices. Cloud security concerns can be grouped into any number of dimensions. 7. Security and privacy identity management Every enterprise will have its own identity management system to control access to information and computing resources. Cloud providers either integrate the customer s identity management system into their own infrastructure, using federation or SSO technology, or provide an identity management solution of their own. 8. Physical and personnel security Providers ensure that physical are adequately secure and that access to these as well as all relevant customer data is not only restricted but that access is documented. 9. Availability Cloud providers assure customers that they will have regular and predictable access to their data and applications. 10. Application security Cloud providers ensure that applications available as a service via the cloud are secure by implementing testing and acceptance procedures for outsourced or packaged application code. It also requires application security measures be in place in the production environment. 11. Privacy Finally, providers ensure that all critical data (credit card numbers, for example) are masked and that only authorized users have access to data in its entirety. Moreover, digital identities and credentials must be protected as should any data that the provider collects or produces about customer activity in the cloud. 12. Legal issues In addition, providers and customers must consider legal issues, such as Contracts and E-Discovery, and the related laws, which may vary by country. VIII. MONITORING Cloud monitoring can refer to the monitoring of the performance of physical and virtual servers, the resources they share, and the applications running on them. Cloud monitoring tools are often employed for this purpose and can aggregate data and show patterns that might be hard to identify otherwise. Cloud monitoring tools help an administrator keep cloud environments operating at peak efficiency. The dashboard tells about the network, speed, CPU utilization, allocated and used memory when provisioning memory or CPU. Monitoring includes: Tracking virtual server instances Triggering event and notifications in case of server failures. Overseeing web servers, databases, mail servers, TCP ports and SSH access all based on user- rules for existing and automatically-launched new server instances. Adding monitors and notifications automatically for newly launched servers based on user-defined rules. Automatically deploying monitoring agents on new servers to monitor their performance and resource utilization. Eliminating time-consuming setups required with other uptime and end-user monitoring services. IX. CONCLUSION This research gives a review of the building blocks to the architecture of a cloud platform. These building blocks encompass nodes and clusters, hypervisors, virtual, networks and network isolation, billing and accounting, elasticity, cloud storage, security and monitoring, to name but a few. A conclusion section is not required. Although a conclusion may review the main points of the paper, do not replicate the abstract as the conclusion. A conclusion might elaborate on the importance of the work or suggest applications and extensions. REFERENCES [1] Cloud computing as a business continuity plan, [2] How cloud computing can transform business, [3] K. E. Kushida, D. Breznitz, J. Zysman, Cutting through the fog: understanding the competitive dynamics in cloud computing, The Berkeley Roundtable on the International Economy,(BRIE) Working Paper 190 (Beta), May 1, [4] McKinsey & Co. Clearing the air on cloud computing, Report presented at Uptime Institute Symposium. April [5] L. M. Vaquero, l. Rodero-Merino, J. Caceres, M. Lindner, A break in the cloud: towards a cloud definition, ACM SIGCOMM Computer Communication Review, Vol. 39, No. 1, pp January
Intro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
Cloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
Cloud Computing. Adam Barker
Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
Cloud billing: The missing link for cloud providers
WHITE PAPER Cloud billing: The missing link for cloud providers _experience the commitment Entire contents 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
How To Compare Cloud Computing To Cloud Platforms And Cloud Computing
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms
How To Create A Cloud Based System For Aaas (Networking)
1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Private cloud computing advances
Building robust private cloud services infrastructures By Brian Gautreau and Gong Wang Private clouds optimize utilization and management of IT resources to heighten availability. Microsoft Private Cloud
Virtualization and Cloud Computing
Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing
CHAPTER 2 THEORETICAL FOUNDATION
CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Operating Systems Virtualization mechanisms
Operating Systems Virtualization mechanisms René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Contents 1 Introduction 2 Hardware Virtualization mechanisms
Cloud Optimize Your IT
Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Cloud Computing and Attacks
Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Sistemi Operativi e Reti. Cloud Computing
1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi [email protected] 2 Introduction Technologies
Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction
CS 695 Topics in Virtualization and Cloud Computing and Storage Systems Introduction Hot or not? source: Gartner Hype Cycle for Emerging Technologies, 2014 2 Source: http://geekandpoke.typepad.com/ 3 Cloud
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
Best Practices for Virtualised SharePoint
Best Practices for Virtualised SharePoint Brendan Law [email protected] @FlamerNZ Flamer.co.nz/spag/ Nathan Mercer [email protected] @NathanM blogs.technet.com/nmercer/ Agenda Why Virtualise? Hardware
Design of Cloud Services for Cloud Based IT Education
www.jitae.org Journal of Information Technology and Application in Education Vol. 3 Iss. 3, September 2014 doi: 10.14355/jitae.2014.0303.03 Design of Cloud Services for Cloud Based IT Education Li Chao
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
The Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
Data Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
New Data Center architecture
New Data Center architecture DigitPA Conference 2010, Rome, Italy Silvano Gai Consulting Professor Stanford University Fellow Cisco Systems 1 Cloud Computing The current buzzword ;-) Your computing is
Virtualization with Windows
Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group Agenda Current status of IT-IS group virtualization service Server Self Service New virtualization features in
Virtual Computing and VMWare. Module 4
Virtual Computing and VMWare Module 4 Virtual Computing Cyber Defense program depends on virtual computing We will use it for hands-on learning Cyber defense competition will be hosted on a virtual computing
Windows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
Virtualization and Cloud Computing
Written by Zakir Hossain, CS Graduate (OSU) CEO, Data Group Fed Certifications: PFA (Programming Foreign Assistance), COR (Contracting Officer), AOR (Assistance Officer) Oracle Certifications: OCP (Oracle
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
RE Cloud from Richardson Eyres
RE Cloud from Richardson Eyres Frequently asked Questions What is RE Cloud? RE Cloud is Richardson Eyres cloud computing service delivering virtualised, on demand multi tenant elastic computing resource.
CLOUD COMPUTING OVERVIEW
CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications
Virtualizing Exchange
Virtualizing Exchange Simplifying and Optimizing Management of Microsoft Exchange Server Using Virtualization Technologies By Anil Desai Microsoft MVP September, 2008 An Alternative to Hosted Exchange
Zadara Storage Cloud A whitepaper. @ZadaraStorage
Zadara Storage Cloud A whitepaper @ZadaraStorage Zadara delivers two solutions to its customers: On- premises storage arrays Storage as a service from 31 locations globally (and counting) Some Zadara customers
Restricted Document. Pulsant Technical Specification
Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
REDCENTRIC INFRASTRUCTURE AS A SERVICE SERVICE DEFINITION
REDCENTRIC INFRASTRUCTURE AS A SERVICE SERVICE DEFINITION SD021 V2.2 Issue Date 01 July 2014 1) OVERVIEW Redcentric s Infrastructure as a Service (IaaS) enables the to consume server, storage and network
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
Microsoft Private Cloud Fast Track
Microsoft Private Cloud Fast Track Microsoft Private Cloud Fast Track is a reference architecture designed to help build private clouds by combining Microsoft software with Nutanix technology to decrease
Getting Familiar with Cloud Terminology. Cloud Dictionary
Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know
Cloud Computing and Amazon Web Services
Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD
CloudCenter Full Lifecycle Management. An application-defined approach to deploying and managing applications in any datacenter or cloud environment
CloudCenter Full Lifecycle Management An application-defined approach to deploying and managing applications in any datacenter or cloud environment CloudCenter Full Lifecycle Management Page 2 Table of
Cloud Computing with Red Hat Solutions. Sivaram Shunmugam Red Hat Asia Pacific Pte Ltd. [email protected]
Cloud Computing with Red Hat Solutions Sivaram Shunmugam Red Hat Asia Pacific Pte Ltd [email protected] Linux Automation Details Red Hat's Linux Automation strategy for next-generation IT infrastructure
How To Make A Virtual Machine Aware Of A Network On A Physical Server
VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Rapid Application Development
Rapid Application Development Chapter 7: Development RAD with CASE tool: App Inventor And Cloud computing Technology Cr: appinventor.org Dr.Orawit Thinnukool College of Arts, Media and Technology, Chiang
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
VIRTUALIZATION THE FOUNDATION OF CLOUD COMPUTING
VIRTUALIZATION THE FOUNDATION OF CLOUD COMPUTING TM 989 Old Eagle School Road Suite 815 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Did You Know Approximately 70 percent of a typical IT budget in
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
Server Virtualization with VMWare
Server Virtualization with VMware Information Technology Server Virtualization with VMWare A look at server virtualization, what it is and why it should be considered. By Alex Dewar, Head of IT & IM Solutions,
Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation
Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation This paper discusses how data centers, offering a cloud computing service, can deal
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain
Desktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
Virtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
SERVER 101 COMPUTE MEMORY DISK NETWORK
Cloud Computing ก ก ก SERVER 101 COMPUTE MEMORY DISK NETWORK SERVER 101 1 GHz = 1,000.000.000 Cycle/Second 1 CPU CYCLE VIRTUALIZATION 101 VIRTUALIZATION 101 VIRTUALIZATION 101 HISTORY YEAR 1800 YEARS LATER
Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
Virtualization & Cloud Computing (2W-VnCC)
Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
White Paper. Recording Server Virtualization
White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...
NET ACCESS VOICE PRIVATE CLOUD
Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of
FOR SERVERS 2.2: FEATURE matrix
RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,
Solving I/O Bottlenecks to Enable Superior Cloud Efficiency
WHITE PAPER Solving I/O Bottlenecks to Enable Superior Cloud Efficiency Overview...1 Mellanox I/O Virtualization Features and Benefits...2 Summary...6 Overview We already have 8 or even 16 cores on one
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
CA Cloud Overview Benefits of the Hyper-V Cloud
Benefits of the Hyper-V Cloud For more information, please contact: Email: [email protected] Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,
How To Understand Cloud Computing
Virtualizing the Private Cloud for Maximum Resource Utilization C.Shreeharsha, Prof.ManasiKulkarni Computer Engineering Department, VJTI, Matunga, Mumbai, India, E-mail:[email protected]. Abstract
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
Basics of Virtualisation
Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are
Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V
Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
Implementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track**
Course: Duration: Price: $ 4,295.00 Learning Credits: 43 Certification: Implementing and Troubleshooting the Cisco Cloud Infrastructure Implementing and Troubleshooting the Cisco Cloud Infrastructure**Part
What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!
Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era
G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS
G-Cloud Service Definition Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS Canopy Unmanaged Enterprise Private Cloud IaaS Canopy Unmanaged Enterprise Private Cloud delivers the efficiencies,
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
Open-E Data Storage Software and Intel Modular Server a certified virtualization solution
Open-E Data Storage Software and Intel Modular Server a certified virtualization solution Contents 1. New challenges for SME IT environments 2. Open-E DSS V6 and Intel Modular Server: the ideal virtualization
