How To Create A Cloud Based System For Aaas (Networking)



Similar documents
IOS110. Virtualization 5/27/2014 1

Intro to Virtualization

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed Computing

Full and Para Virtualization

9/26/2011. What is Virtualization? What are the different types of virtualization.

Data Centers and Cloud Computing

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.

Cloud Computing CS

Introduction to Virtualization

How To Install Eucalyptus (Cont'D) On A Cloud) On An Ubuntu Or Linux (Contd) Or A Windows 7 (Cont') (Cont'T) (Bsd) (Dll) (Amd)

Virtualization. Types of Interfaces

Networking for Caribbean Development

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

The Private Cloud Your Controlled Access Infrastructure

CS 695 Topics in Virtualization and Cloud Computing. Introduction

Lecture 02b Cloud Computing II

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction

Basics of Virtualisation

Chapter 2 Addendum (More on Virtualization)

Distributed and Cloud Computing

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Virtualization Technologies (ENCS 691K Chapter 3)

Virtualizare sub Linux: avantaje si pericole. Dragos Manac

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

COM 444 Cloud Computing

Virtualization and the U2 Databases

How To Make A Minecraft Iommus Work On A Linux Kernel (Virtual) With A Virtual Machine (Virtual Machine) And A Powerpoint (Virtual Powerpoint) (Virtual Memory) (Iommu) (Vm) (

Mobile Cloud Computing T Open Source IaaS

CSE 501 Monday, September 09, 2013 Kevin Cleary

Clouds Under the Covers. Elgazzar - CISC Fall

2) Xen Hypervisor 3) UEC

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Virtualization Technologies

Performance Comparison of VMware and Xen Hypervisor on Guest OS

Cloud Computing. Chapter 1 Introducing Cloud Computing

Virtual Machine Management with OpenNebula in the RESERVOIR project

Operating Systems Virtualization mechanisms

A cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype

Cloud Computing. Chapter 8 Virtualization

Deployment Options for Microsoft Hyper-V Server

Masters Project Proposal

ArcGIS for Server: In the Cloud

<Insert Picture Here> Oracle VM and Cloud Computing

Large Construction of a Cloud IaaS with Dynamic Resource Allocation Method Using OpenStack

Definitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh

Proactively Secure Your Cloud Computing Platform

Cloud Computing. Chapter 1 Introducing Cloud Computing

Virtualization. Dr. Yingwu Zhu

Virtualization Approaches in Cloud Computing

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

COS 318: Operating Systems. Virtual Machine Monitors

SCO Virtualization Presentation to Customers

Introduction to Virtual Machines

Virtualization. Michael Tsai 2015/06/08

Enterprise-Class Virtualization with Open Source Technologies

Virtualization and Cloud Computing

The Cloud as a Computing Platform: Options for the Enterprise

Installing & Using KVM with Virtual Machine Manager COSC 495

The Building Blocks to the Architecture of a Cloud Platform

Auto-Scaling Model for Cloud Computing System

Virtualization. Pradipta De

White Paper on NETWORK VIRTUALIZATION

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Introduction What is the cloud

VMware Building Many Bridges to the Cloud

Database Virtualization

Hybrid Virtualization The Next Generation of XenLinux

VIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS

Options in Open Source Virtualization and Cloud Computing. Andrew Hadinyoto Republic Polytechnic

VMware Server 2.0 Essentials. Virtualization Deployment and Management

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Virtualization & Cloud Computing (2W-VnCC)

Hypervisors and Virtual Machines

Virtualization Technology. Zhiming Shen

Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS

Date: December 2009 Version: 1.0. How Does Xen Work?

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

Virtualizing a Virtual Machine

Virtual machines and operating systems

Virtualization. as a key enabler for Cloud OS vision. Vasily Malanin Datacenter Product Management Lead Microsoft APAC

Optimal Service Pricing for a Cloud Cache

The Art of Virtualization with Free Software

Lecture 02a Cloud Computing I

Cloud Computing Architecture: A Survey

<Insert Picture Here> Enabling Cloud Deployments with Oracle Virtualization

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Transcription:

1

3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on the usage amount of resources. End user use Web browser to access the service provided from specific IaaS provider. 2

IaaS Features--1 Lower threshold for the use Users can spent lower cost to rent and get available computing resources. They do not need to purchase a large number of hardware. The better scalability Users could dynamically increase or decrease the computing resources on-demand. 3

IaaS Features--2 Easier to manage Management of resources through the Internet. More flexible Through Internet, users can unrestricted control the server in the cloud. Resources more flexible Under the conditions of the user to pay, user can always enable or disable all of the resources. 4

Key Implementation Technologies of IaaS Server Virtualization Storage Virtualization Networking Virtualization Cloud Computing Management Platform 5

3.2 Key Implementation Technologies of IaaS --1:Server Virtualization Technical Terms CPU Virtualization Storage Virtualization I/O Virtualization 6

Technical Terms Virtual Machine( 虛 擬 機 器 ) A virtual server which generate from the server virtualization technology is called a virtual machine(vm). Guest OS( 客 體 作 業 系 統 ) Run on a virtual machine's operating system is called the guest operating system. VMM or Hypervisor( 虛 擬 機 器 管 理 器 ) The software responsible for the management of virtual machine called Virtual Machine Manager(VMM) or Hypervisor 7

3.2.1 Server Virtualization Hosted Architecture ( 寄 生 架 構 ) Bare-metal Architecture ( 原 生 架 構 ) 8

Hosted Architecture Virtual server hosted on the host OS. VMM is installed on a computer's main OS, and then create and manage virtual machines on the VMM. Because the VMM and the VM both are parasitic on the main OS, it is known as a parasitic architecture. Typical examples : Oracle Virtual Box VMware Workstation. 9

Parasitic Architecture Drivers Hardware Resource 10

Bare-metal Architecture The VMM installed directly on a physical server then produce VM through the VMM, then install other OS (such as Window, Linux, etc.) on it. Typical examples: Vmware ESX Xen KVM etc. Nowadays, widely recognized that the performance of Bare-metal VM architecture is better than the parasitic one. 11

Hosted Architecture Examples: XEN Hardware resource 12

Bare-metal Architecture Examples: VMware vsphere 13

3.2.2 CPU Virtualization Simulating a physical CPU into multiple virtual CPU for the use of VM. VMM responsible for virtual CPU time slice allocating and managing. 14

CPU Virtualization The X86CPU instructions set has o-3(4) privilege level(rating),level 0 is highest privilege, it is use to execute OS, and level 3 is lowest privilege, use to execute applications. When in the virtualization model, VMM must use the highest privilege level (level 0), while the OS on VM will be diverted to the other on the lower privilege level, it is why we have to process the VM OS-related instructions. 15

CPU Virtualization CPU virtualization simulation execution Through VMM to simulate, such as earlier Vmware. OS assisted CPU virtualization Using Hypercall communicate with VMM, such as Windows. Hardware assisted CPU virtualization Nowadays, hardware-assisted virtualization of CPU is the mainstream technology of VMM, such as Hyper-V, Vmware, etc.. 16

3.2.3 Storage Virtualization As seen through the VMM, VM memory has mapping into physical memory. There are 3 kinds of memory addresses: The machine address: hardware address of the real machine. Virtual machine physical address: pseudo-physical address of VM on VMM abstraction. Virtual address: the address provide by guest OS for application. 17

3.2.4 I/O Virtualization Through intercepted guest os on the I / O device access requests, using software to simulate real hardware, reuse limited external devices. Typical I/O Device Full virtualization Para-virtualization Software simulation Direct division 18

Full Virtualization VMM simulate network cards, disk drives and other key I / O to form a set of uniform virtual I / O devices. Where the Guest OS access to the virtual I/O device, it will be cached by VMM and then mapped to actual I / O devices. Advantages: better performance. Disadvantages: complexity VMM design 19

Para-Virtualization Also known as the front-end / back-end simulation On the Guest OS, it need to install special I / O Driver called the front end driver. VMM provides a simplified driver that know as the back-end (Back end driver) Advantages: Simplified VMM design. Disadvantages: It need install special I/O drivers on guest OS or modify guest OS. 20

Software simulation Using software simulation approach to realize virtual I / O. I/O on guest OS cached by VMM, and transfer to host OS, then through system call to simulate device action. Advantages: it could reuse current drivers. Disadvantages: lower performance, because finish an operation involving multiple registers, there's a context switch times. 21

Direct Division The actual I/O devices are assigned to specific virtual I/O, and guest OS directly access I/O devices without through VMM or privilege domain. Advantages: directly access I/O to reduce consumer of virtualization. Disadvantage: it need to purchase more hardware devices. Related technologies: Intel VT-d AMD IOMMU PCI-SIG IOV etc. 22

3.3 Key Implementation Technologies of IaaS 2: Storage Virtualization Applications File Record Layer DB FS Storage area Machine Network Block Cluster Devices Storage Device(HD etc.) Block Layer Services Fig 3.3 SNIA s Common Storage Model 23

3.3 Storage Virtualization--1 Storage Devices Storage Layer Virtualization Physical device on bottom layer: hard disk drivers is the most important storage device. Virtualization mainly in data block storage location (address) virtualization. The another important feature of virtual disk is to ensure zero defect of storage, when there is damage to the storage blocks, disk firmware will appreciate mapping it to spare sectors. SINA Share Storage Model 24

3.3 Storage Virtualization2 Block cluster layer storage Block Cluster Layer Storage Virtualization Aggregating physical storages to form an enough capacity with reliable and high performance virtual storage, then divide it into several disks for users. Divided into in-frequency and out-frequency virtualization technologies. Example such as Database as a Service; DAS Storage Area Network; SAN SINA Share Storage Model 25

Storage Virtualization Storage Virtualization 26

3.3 Storage Virtualization--3 File record layer File record layer storage virtualization Objective: to make it easier for users to use the lowerlevel storage resources. The main technologies: the file system and database system virtualization. Application instance: Network Attached Storage; NAS SINA Share Storage Model 27

3.4 Key Implementation Technologies of IaaS 3: Network Virtualization Purpose: integration of multiple hardware and software with related network into a resources which can unified control with a software. The key technology divided into two categories: VPN(Virtual Private Network), VLAN( Virtual Local Area Network). The technology of virtual network and virtual bridge. 28

Problems need to solve of virtual network How to realize virtual network on physical machine? How to dynamic adjust external network to fit the changing requirement of virtual network? How to ensure the safety of a virtual network environment? How to unified management internal and external virtual network on physical machines? 29

Network virtualization technology 1: Traditional network virtualization technology VPN(Virtual Private Network) For the bottom layer computer, VPN data is same as other network data. The most common application is, VPN means to create a virtual encrypted on a two or three-tier network. VLAN(Virtual LAN) Making a group of hosts on a fixed physical network can be dynamically controllable formation of one or more virtual LAN 30

Network virtualization technology 2: Host network virtualization technology 31

Internet switch Connect to internet host1 host2 Connect to server in intranet Intranet switch Fig Typical Architecture of virtual network 32

Key Implementation Technologies of IaaS--3 33

3.5 Cloud Computing Management Platform Business service management platform Resource management platform Infrastructure resource pool Virtualization 34

Cloud Computing Management Platform Business service management platform To package of resources into a variety of services to provide users with easy-to-use way of external applications. Resource management platform Responsible for the physical device and virtualization resources in a unified management and scheduling Key technologies include: automated deployment of virtual machines, the ability to provide flexibility, resources status monitoring, measurement, and recycling etc. 35

Cloud Services Billing Consumer spending amount = Price x Quantity For example: EC2 pricing: Regular Linux 0.031$/hr Regular Windows 0.08$/hr Service name Measure index Scale EC2 Instance Time usage hours Elastic IP address Quantity of IP address using Frequency Amazon Cloud Watch Time usage hours Elastic block store Storage usage * Time Gbytes per month Elastic load balance Time usage hours Internet data transfer Network flow Gbytes 36

IaaS Providers NDS http://nds.ps158.com/ Amazon http://aws.amazon.com/ec2/ Google https://cloud.google.com/products/compute-engine/ FETnet( 遠 傳 ) http://www.fetnet.net/cs/satellite/ebu/cloudiaas_intro Taiwan Mobile( 台 灣 大 ) http://www.twmsolution.com/product/iaas/index_1.htm 37

Amazon EC2(Elastic Computing Cloud) Operation Demo Introduction Amazon is a largest B2C e-commerce company in America. To make numerous Server during the low season can be fully applied, so using virtual technology transfer multientity Server into Virtual Server and online transactions in the form of rent, forming AWS (Amazon Web Service). Through the evolution, Amazon not only provide computing services, storage services, network services, monitoring services, they also provide human services. 38

Step1 Registered as an EC member 39

Step2 Setup available area 40

Step3 Setup firewall 41

Step4 Deploy Virtual Machine 42