Sky Computing: When Multiple Clouds Become One
|
|
|
- Blake Simpson
- 10 years ago
- Views:
Transcription
1 Sky Computing: When Multiple Clouds Become One José Fortes Advanced Computing and Information Systems Lab and
2 Clouds Provider view Economies of scale Statistical multiplexing Avoid customer-specific complexities Consumer view No need to (over)provision No operating costs Pay per use Win-win decoupling Virtualization in the large Managed Datacenter(s) Service Interfaces Consumers/Users
3 Cloud computing trivia for conferences with cloud in the title 5/10 top search hits for Cloud 200+ cloud providers in the US Much more related research/work than what I can acknowledge in this talk
4 Outline Cloud world and ecosystem Sky computing Networking across clouds Other issues Conclusions
5 The world of a cloud Cloud middleware Datacenter Datacenter Datacenter Cloud Engineering Cloud services Cloud (Architecture) XaaS Business Apps/Soft Education Apps/Soft Science Apps/Soft Government Apps/Soft. Cloud Computing Cloud applications Users
6 Datacenters Building blocks in shipping containers Servers come setup and wired Large pluggable components ready to go once connected to power, network, cooling Densely packed ~5-to-7 fold savings in operational costs (server admin, Mbps, GB)
7 Cloud middleware and services
8 Early multi-cloud consumer systems Nested Replicated or diversified middleware middleware middleware middleware Datacenters Datacenters Datacenters Datacenters XaaS Cloud XaaS Cloud XaaS Cloud IaaS Cloud PaaS Cloud Applications Applications Applications SaaS Cloud Applications Geographic factors Markets, locationdependent services Dependability/continuity 24/7, disaster recovery, diversity Provider independence On demand scale-out Differentiated services Different(iated) apps Hybrids
9 Multi-cloud management tools
10 Contextualization Nimbus Contextualization: Providing One-Click Virtual Clusters, Keahey, K., T. Freeman. escience 2008, Indianapolis, IN. December 2008.
11 Cloud Federation with InterCloud Application scaling across multiple cloud providers Brokers, exchanges and coordinators Buyya et al CLOUDS U. Melbourne
12 Intercloud standards Protocols, formats and mechanisms for interoperability From David Bernstein, Hwawei Tech.,
13 Combinatorial Innovation historically, you ll find periods in history where there would be the availability of a different component parts that innovators could combine or recombine to create new inventions. In the 1800s, it was interchangeable parts. In 1920, it was electronics. In the 1970s, it was integrated circuits. Now what we see is a period where you have Internet components, where you have software, protocols, languages, and capabilities to combine these component parts in ways that create totally new innovations. The great thing about the current period is that component parts are all bits. That means you never run out of them. You can reproduce them, you can duplicate them, you can spread them around the world, and you can have thousands and tens of thousands of innovators combining or recombining the same component parts to create new innovation. So there s no shortage. There are no inventory delays. It s a situation where the components are available for everyone, and so we get this tremendous burst of innovation that we re seeing. Hal Varian, chief Google economist and professor at UC Berkeley
14 Combined clouds Combine: to bring into such close relationship as to obscure individual characteristics middleware Datacenters middleware Datacenters middleware Datacenters XaaS Cloud XaaS Cloud XaaS Cloud Combined cloud Applications Heterogeneous virtual cluster on a WAN aas (Excel-based) geospatial market analytics aas Personalized health from multiple providers aas
15 Sky computing Combined use of multiple clouds Resources/apps/platforms across independent clouds are used Services other than those of each individual cloud Transparency of multiple clouds - single-cloud like Sky providers are consumers of cloud providers Virtual datacenter-less dynamic clouds Many challenges and questions Communication among resources in different clouds is of key importance
16 Communication Problems Connectivity limitations due to the lack of publicly accessible addresses, firewalls, NATs Grid computing solutions available (API-based, VPN, P2P, VNET, ViNe ) User-level network virtualization is a solution adopted by the majority of projects Dangers of VM privileged users on the cloud change IP and/or MAC addresses configure Network Interface Card in promiscuous mode use raw sockets attack network (spoofing, proxy ARP, flooding, ) Cloud providers impose network restrictions that severely affect the ability of network virtualization techniques to work efficiently
17 Network Restrictions in Clouds Internal routing and NAT IP addresses (especially public) are not directly configured inside VMs, and NAT techniques are used Sandboxing VMs are connected to host-only networks VM-to-VM communication is enabled by a combination of NAT, routing and firewalling mechanisms Packet filtering (beyond usual) VMs packets are inspected and only those packets containing valid addresses (IP and MAC assigned by the provider) are allowed
18 Network Challenges in Clouds Internal routing / NAT High number of intermediate nodes (hops) in LAN communication (nodes on the same subnet, thus no hops in-between are expected) EC2 public-to-public 6+ hops EC2 private-to-private 3+ hops (better) Sandboxing Disables direct datalink layer (L2) communication Can t use VMs as routers No node-to-gateway communication Packet filtering Only allows packets w/ source IP address Disables VM ability to act as a router No gateway-to-node communication
19 Typical IaaS Network Physical Server A Physical Server B VM A1 VM A2 VM B1 VM B2 Firewall proxyarp Forwarding NIC Firewall proxyarp Forwarding NIC Physical Network
20 Typical IaaS Network Physical Server A VM A1 VM A2 VMs are not bridged Physical to the Server B physical network. Host VM A1 server of each VM routes, monitors and filters network traffic. VMs can only see the host server MAC address VM B2 Firewall proxyarp Forwarding NIC Firewall proxyarp Forwarding NIC Physical Network
21 Typical IaaS Network Physical Server A Physical Server B VM A1 VM A2 VM B1 VM B2 Firewall proxyarp If a MAC address NIC is statically Forwarding configured, packets are dropped by the host server Firewall proxyarp Forwarding NIC Physical Network
22 Typical IaaS Network Physical Server A VM A1 VM A2 VM B1 VM B2 Firewall proxyarp Forwarding NIC Physical Network Firewall proxyarp Forwarding NIC Physical VMs cannot Server act as gateways Ex: B1 is a gateway to virtual networks VM A1 VM A2 for A2 B1 s MAC address is unknown to A2!
23 Typical IaaS Network Physical Server A VM A1 VM VM NICs A2 can be only configured with the IP address assigned by the cloud provider. VN approaches that require additional addresses do not work. Physical Server B VM A1 VM A2 Firewall proxyarp Forwarding NIC Firewall proxyarp Forwarding NIC Physical Network
24 Typical IaaS Network Physical Server A Physical Server B VM A1 VM A2 VM B1 VM B2 VMs cannot act as routers. Source-IP-address checks on host servers drop packets with source addresses that differ from the VM s IP. Firewall proxyarp Forwarding NIC Firewall proxyarp Forwarding NIC Physical Network
25 User-level Virtual Network - ViNe General purpose overlay network solution Based on deployment of user-level virtual routers VRs are used as gateways by nodes that do not run ViNe software Applications run unmodified Best performance VRs ability to perform overlay routing affected by cloud network restrictions Limited node-to-vr communication due to use of L2 communication
26 ViNe Routing packet processing in Java in user space Processing Time Linux Libnet Linux Netfilter Compute nodes need no additional software 12µs/message Local Network Description Table (LNDT) Describes the VN membership of a node Global Network Description Table (GNDT) Describes sub-networks for which a VR is responsible Protocol data TCP/IP header VN header TCP/IP header Message
27 ViNe Routing Local Network Description Table (LNDT) Describes the VN membership of a node Global Network Description Table (GNDT) Describes the sub-networks that a VR is responsible Suppose that a VR with the following routing tables, received a packet from destined to GNDT ViNe ID 1 Network/Mask Destination LNDT Host ViNe ID /24 VR-a /24 VR-b GNDT ViNe ID 2 Network/Mask Destination /24 VR-a /24 VR-c
28 ViNe Routing Original, unmodified packet VH1 VH2 is delivered Problem: packet injection is blocked in clouds Example: VH1 sends a packet to VH2 VH4 VH2 ViNe domain VRC ViNe domain VRA ViNe packet is encapsulated VRB looks up its routing table. with an additional header for The table indicates that the transmission packet in should physical be forwarded to space: B A:(VH1 A VH2) VH Virtual Space VRD VH ViNe domain VRB ViNe domain Packet with header VH1 VH2 is directed to VRB using L2 communication (MAC VH1 MAC VRB) Problem: communication is blocked in clouds VH3 VH1 VR H ViNe Router Host ViNe header is stripped off for final delivery H2 A H Public network A R Physical Space N H Private network B B H1 H H4 Private network C N Internet F H Public network D H3 R N F Router NAT Firewall
29 Solution Configure all nodes to work as VRs No need for host-to-vr L2 communication TCP or UDP based VR-to-VR communication circumvents the source address check restriction But Network virtualization software required in all nodes Network virtualization overhead in inter- and intra-site communication Complex configuration and operation TinyViNe No need to implement complex network processing leave it to specialized resources (i.e., full-vrs) Keep it simple, lightweight, tiny Use IP addresses as assigned by providers Make it easy for end users to deploy M. Tsugawa* et al. User-level Virtual Networks Support for Sky Computing, e-science, 12/09.
30 TinyViNe TinyViNe software Enables host-to-vr communication on clouds using UDP tunnels TinyVR nodes running TinyViNe software TinyVR processing Intercept packets destined to full-vrs Transmit the intercepted packets through UDP tunnels Decapsulate incoming messages through UDP tunnels Deliver the packets
31 TinyViNe Routing The packet TV1 TV2 is transmitted by VRA to TV2 using regular UDP mechanisms VRA TV2 :(TV1 TV2) TinyViNe software recovers the original packet and delivers to TV2 Example: TV1 sends a packet to TV2 TV4 TV2 ViNe domain VRC ViNe packet is encapsulated VRB with an additional lookup header its routing for table. The table indicates that the packet transmission in physical should be forwarded to A space: B A:(TV1 TV2) ViNe domain VRA TV Virtual Space VRD TV ViNe domain VRB ViNe domain Packet with header TV1 TV2 is intercepted by TinyViNe software and transmitted to VRB using regular UDP mechanisms TV1 VRB :(TV1 TV2) TV3 TV1 VR TV Full ViNe Router TinyVR ViNe header is stripped off for final delivery H2 A H Public network A R Physical Space N H Private network B B H1 H H4 Private network C N Internet F H Public network D H3 R N F Router NAT Firewall
32 TinyViNe Overheads Interference on other applications CPU Utilization Direct TinyViNe ViNe Matrix multiplication 95.62% 92.74% 89.04% Network application 1.44% 1.17% 1.04% (Tiny)ViNe software % 11.98% Impact on communication-intensive application
33 Experiment on the sky 3 cloud providers at University of Florida, University of Chicago and Purdue University All 3 providers offer IaaS using Nimbus Offers APIs to create and manage VMs Contextualization: mechanisms by which VMs are adapted to their environments e.g., on a virtual cluster deployment, each node can be configured with different roles TinyViNe deployed by adding 1 line to the Nimbus virtual cluster configuration file
34 3-sites experiment
35 Sky Computing Virtual Cluster FutureGrid UCSD Tiny ViNe UC PU Tiny ViNe Intel Xeon Woodcrest, 2.33 GHz, 2.5 GB RAM, Linux AMD Opteron 248, 2.2 GHz, 3.5 GB RAM, Linux Melbourne, Australia connected to UF (ssh) FutureGrid UF UF ViNe Download Server Intel Xeon Prestonia, 2.4 GHz, 3.5 GB RAM, Linux ViNe-enable sites 2. Configure ViNe VRs 3. Instantiate BLAST VMs 4. Contextualize a.retrieve VM information b.vine-enable VMs c.configure Hadoop
36 Summary User-level overlay networks needed for intercloud communication Hard to deploy due to cloud-specific restrictions Overcome via network-virtualization software in VMs It is important to keep the software simple and light TinyViNe enables applications across clouds Experiments with parallel bioinformatics applications show that it efficiently enables sky computing Can be implemented as a service by a cloud provider, in the context broker of a sky provider or by the consumer Being improved to enable autonomic networking
37 Beyond communication XaaS = abstractions as a service Which ones to use? SLAs: what is in them and how to support? Affect management of performance, complexity, dependability, Contextualization, coordination and management Modeling is essential middleware Datacenters XaaS Cloud middleware Datacenters Combined cloud Applications Issues: security, privacy, business models XaaS Cloud
38 Resource usage estimation Provider perspective can improve resource utilization, as schedulers are able to fit more requests in the same resource Consumer perspective to choose the most cost-effective cloud and resource configuration for a given problem BLASTX on 32 nodes, 64 processors, 256 uniform tasks BLASTX on 32 nodes, 64 processors, 256 skewed tasks :42: Processor ID :45:43 UC UF PU Processor ID UC UF PU :00:00 0:07:12 0:14:24 0:21:36 0:28:48 0:36:00 0:43:12 Exection time (h:mm:ss) 0 0:00:00 0:07:12 0:14:24 0:21:36 0:28:48 0:36:00 0:43:12 Execution time (h:mm:ss)
39 Fault modeling If components are cloud services, what is a component fault? SLA violation? User-defined condition? Unusual behavior? E.g. resource-exhaustion faults How can the health of a sky system/app be managed? What/how are concerns separated? E.g. virtual routers A distributed system is one in which the failure of a computer you didn't even know existed can render your own computer unusable Leslie Lamport Similar issues for security, privacy, performance Autonomic solutions desirable
40 Conclusions Clouds provide the components for novel types of IT systems or novel implementations of familiar IT system architectures Sky-computing refers to such systems and their use In particular, combined clouds capable of providing environments, workflows, enterprise IT, etc as a service Design and management of combined clouds face challenges and need fundamental and systemoriented advances A new area for IT research Essential for standards and next generation of IT businesses
41 Acknowledgments Sponsors National Science Foundation BellSouth Foundation Center for Autonomic Computing (UF site) Citrix, IBM, Intel, Microsoft, Northrop-Grumman Collaborators Andrea Matsunaga and Mauricio Tsugawa Kate Keahey, Tim Freeman Renato Figueiredo and others at ACIS/CAC NSF FutureGrid team
42 FutureGrid: a Grid Testbed IU Cray operational, IU IBM (idataplex) completed stability test May 6 UCSDIBM operational, UFIBM stability test completes ~ May 12 Network, NID and PU HTC system operational UC IBM stability test completes ~ May 27; TACC Dell awaiting delivery of components Private Public FG Network NID: Network Impairment Device
43 FutureGrid The goal of FutureGrid is to support the research on the future of distributed, grid, and cloud computing. FutureGrid will build a robustly managed simulation environment or testbed to support the development and early use in science of new technologies at all levels of the software stack: from networking to middleware to scientific applications. FutureGridis a (small 5600 core)science/computer Science Cloud but it is more accurately a virtual machine based simulation environment
44 futuregrid.org 44
45 FutureGrid Partners Indiana University (Architecture, core software, Support) Purdue University (HTC Hardware) San Diego Supercomputer Center at University of California San Diego (INCA, Monitoring) University of Chicago/Argonne National Labs (Nimbus) University of Florida (ViNE, Education and Outreach) University of Southern California Information Sciences Institute (Pegasus to manage experiments) University of Tennessee Knoxville (Benchmarking) University of Texas at Austin/Texas Advanced Computing Center (Portal) University of Virginia (OGF, Advisory Board and allocation) Center for Information Services and GWT-TUD from Technische Universtität Dresden. (VAMPIR)
46 Center for Autonomic Computing (nsfcac.org) Founding industry members collaborative partnership amongst industry, academe, and government; concepts, technologies and resources for industry-relevant autonomic computing research; interdisciplinary education on autonomic computing; Industry and government agencies invited to join as members
47
Plug-and-play Virtual Appliance Clusters Running Hadoop. Dr. Renato Figueiredo ACIS Lab - University of Florida
Plug-and-play Virtual Appliance Clusters Running Hadoop Dr. Renato Figueiredo ACIS Lab - University of Florida Advanced Computing and Information Systems laboratory Introduction You have so far learned
Nimbus: Cloud Computing with Science
Nimbus: Cloud Computing with Science March 2010 globusworld, Chicago Kate Keahey [email protected] Nimbus Project University of Chicago Argonne National Laboratory Cloud Computing for Science Environment
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing
Journal of Information & Computational Science 9: 5 (2012) 1273 1280 Available at http://www.joics.com VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing Yuan
IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks
IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks Renato Figueiredo Advanced Computing and Information Systems Lab University of Florida ipop-project.org Unit 3: Intra-cloud Virtual Networks
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
Science Clouds: Early Experiences in Cloud Computing for Scientific Applications Kate Keahey and Tim Freeman
Science Clouds: Early Experiences in Cloud Computing for Scientific Applications Kate Keahey and Tim Freeman About this document The Science Clouds provide EC2-style cycles to scientific projects. This
How To Build A Cloud Computing System With Nimbus
Nimbus: Open Source Infrastructure-as-a-Service Cloud Computing Software Workshop on adapting applications and computing services to multi-core and virtualization CERN, June 2009 Kate Keahey [email protected]
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Extending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
Cloud Computing with Nimbus
Cloud Computing with Nimbus February 2009 Kate Keahey ([email protected]) University of Chicago Argonne National Laboratory Cloud Computing elasticity computing on demand capital expense operational expense
Introduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure
W h i t e p a p e r VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure Table of Contents Executive Summary.... 3 Cloud Computing Growth.... 3 Cloud Computing Infrastructure
Optimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
Network Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
Infrastructure-as-a-Service Cloud Computing for Science
Infrastructure-as-a-Service Cloud Computing for Science October 2009 Banff Centre, Banff, Canada Kate Keahey [email protected] Nimbus project lead University of Chicago Argonne National Laboratory Cloud
WINDOWS AZURE NETWORKING
WINDOWS AZURE NETWORKING The easiest way to connect to Windows Azure applications and data is through an ordinary Internet connection. But this simple solution isn t always the best approach. Windows Azure
Firewall Architecture
NEXTEP Broadband White Paper Firewall Architecture Understanding the purpose of a firewall when connecting to ADSL network services. A Nextep Broadband White Paper June 2001 Firewall Architecture WHAT
RemoteApp Publishing on AWS
RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)
10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information
Amazon EC2 XenApp Scalability Analysis
WHITE PAPER Citrix XenApp Amazon EC2 XenApp Scalability Analysis www.citrix.com Table of Contents Introduction...3 Results Summary...3 Detailed Results...4 Methods of Determining Results...4 Amazon EC2
vcloud Air Disaster Recovery Technical Presentation
vcloud Air Disaster Recovery Technical Presentation Agenda 1 vcloud Air Disaster Recovery Overview 2 What s New 3 Architecture 4 Setup and Configuration 5 Considerations 6 Automation Options 2 vcloud Air
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
From Grid Computing to Cloud Computing & Security Issues in Cloud Computing
From Grid Computing to Cloud Computing & Security Issues in Cloud Computing Rajendra Kumar Dwivedi Assistant Professor (Department of CSE), M.M.M. Engineering College, Gorakhpur (UP), India E-mail: [email protected]
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X
Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj [email protected] 2. Anargha Biswas [email protected] 3. Ambarish Kumar [email protected] 4.
Facility Usage Scenarios
Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Aneka: A Software Platform for.net-based Cloud Computing
Aneka: A Software Platform for.net-based Cloud Computing Christian VECCHIOLA a, Xingchen CHU a,b, and Rajkumar BUYYA a,b,1 a Grid Computing and Distributed Systems (GRIDS) Laboratory Department of Computer
50. DFN Betriebstagung
50. DFN Betriebstagung IPS Serial Clustering in 10GbE Environment Tuukka Helander, Stonesoft Germany GmbH Frank Brüggemann, RWTH Aachen Slide 1 Agenda Introduction Stonesoft clustering Firewall parallel
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Boas Betzler. Planet. Globally Distributed IaaS Platform Examples AWS and SoftLayer. November 9, 2015. 20014 IBM Corporation
Boas Betzler Cloud IBM Distinguished Computing Engineer for a Smarter Planet Globally Distributed IaaS Platform Examples AWS and SoftLayer November 9, 2015 20014 IBM Corporation Building Data Centers The
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Data Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
How to Guide: StorageCraft Cloud Services VPN
How to Guide: StorageCraft Cloud Services VPN CONTENTS Executive Summary...3 Setting up the VPN...4 Connecting to the VPN from a single computer...5 Providing a LAN site with access to the VPN...6 Conclusion...12
RCL: Software Prototype
Business Continuity as a Service ICT FP7-609828 RCL: Software Prototype D3.2.1 June 2014 Document Information Scheduled delivery 30.06.2014 Actual delivery 30.06.2014 Version 1.0 Responsible Partner IBM
Unleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012
Unleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012 2 Who? Viktor van den Berg Consultant @ PQR Former Dutch VMUG Leader Blogger at www.viktorious.nl Twitter @viktoriousss
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
SDN in the Public Cloud: Windows Azure. Albert Greenberg Partner Development Manager Windows Azure Networking [email protected]
SDN in the Public Cloud: Windows Azure Albert Greenberg Partner Development Manager Windows Azure Networking [email protected] Microsoft s big bet on public cloud service Lets companies move their IT
VMUG - vcloud Air Deep Dive. 2014 VMware Inc. All rights reserved.
VMUG - vcloud Air Deep Dive 2014 VMware Inc. All rights reserved. Agenda 1 Overview of vcloud Air 2 Advanced Networking Capabilities 3 Use Cases 4 Overview of Disaster Recovery Service 5 Questions 2 VMware
White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
T-SYSTEMS Cloud STORY
Michael Moritz Lead Enterprise Architect Cloud Computing Cloud & Partner Sales - CTO Office T-Systems International GmbH Agenda Cloud Challenges T-Systems Cloud Strategy 2 Agenda Cloud Challenges T-Systems
Hyper-V Network Virtualization Gateways - Fundamental Building Blocks of the Private Cloud
Hyper-V Network Virtualization Gateways - nappliance White Paper July 2012 Introduction There are a number of challenges that enterprise customers are facing nowadays as they move more of their resources
ACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist
ACANO SOLUTION VIRTUALIZED DEPLOYMENTS White Paper Simon Evans, Acano Chief Scientist Updated April 2015 CONTENTS Introduction... 3 Host Requirements... 5 Sizing a VM... 6 Call Bridge VM... 7 Acano Edge
Stingray Traffic Manager Sizing Guide
STINGRAY TRAFFIC MANAGER SIZING GUIDE 1 Stingray Traffic Manager Sizing Guide Stingray Traffic Manager version 8.0, December 2011. For internal and partner use. Introduction The performance of Stingray
Enabling Large-Scale Testing of IaaS Cloud Platforms on the Grid 5000 Testbed
Enabling Large-Scale Testing of IaaS Cloud Platforms on the Grid 5000 Testbed Sébastien Badia, Alexandra Carpen-Amarie, Adrien Lèbre, Lucas Nussbaum Grid 5000 S. Badia, A. Carpen-Amarie, A. Lèbre, L. Nussbaum
Efficient Cloud Management for Parallel Data Processing In Private Cloud
2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Private Distributed Cloud Deployment in a Limited Networking Environment
Private Distributed Cloud Deployment in a Limited Networking Environment Jeffrey Galloway, Susan Vrbsky, and Karl Smith The University of Alabama [email protected], [email protected], [email protected]
Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts
Expert Reference Series of White Papers vcloud Director 5.1 Networking Concepts 1-800-COURSES www.globalknowledge.com vcloud Director 5.1 Networking Concepts Rebecca Fitzhugh, VMware Certified Instructor
Application Description
Application Description Firewall in front of LAN Different Servers located behind Firewall Firewall to be accessible from Internet Load Balancer to be installed in a TRANSPARENT MODE between Firewall and
Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab
CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use
Simulation-based Evaluation of an Intercloud Service Broker
Simulation-based Evaluation of an Intercloud Service Broker Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, SCC Karlsruhe Institute of Technology, KIT Karlsruhe, Germany {foued.jrad,
What We Can Do in the Cloud (1) -Tutorial for Cloud Computing Course- Mikael Fernandus Simalango WISE Research Lab Ajou University, South Korea
What We Can Do in the Cloud (1) -Tutorial for Cloud Computing Course- Mikael Fernandus Simalango WISE Research Lab Ajou University, South Korea Overview qtoday s highlight:» Cloud Services and Cloud Management
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Introduction to LAN/WAN. Network Layer (part II)
Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking
CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms
CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, César A. F. De Rose,
Polycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1 June 2014 3725-76312-001A Polycom RealPresence DMA 7000 System, Virtual Edition Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE
VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak
Data Center Virtualization and Cloud QA Expertise
Data Center Virtualization and Cloud QA Expertise Highlights Broad Functional QA Experience Deep understanding of Switching and Routing Protocols Strong hands on experience in multiple hyper-visors like
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems
Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions
Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls
CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Firewall Security. Presented by: Daminda Perera
Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network
Proactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
Cluster, Grid, Cloud Concepts
Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls
CSE 4482 Computer Security Management: Assessment and Forensics Protection Mechanisms: Firewalls Instructor: N. Vlajic, Fall 2013 Required reading: Management of Information Security (MIS), by Whitman
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013
the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they
