Abstraction and Virtualization
Abstraction and Virtualization
Introduction
• A collection of objects that are grouped together.
• V2V
– Migration of an application on a virtual machine.
• V2P
– Migration of an application from virtual machine to
computer physical resoruces.
Load Balancing and Virtualization
• One characteristic of cloud computing is virtualized network access to a
service.
• No matter where you access the service, you are directed to the available
resources.
• Decentralized Approach
– Each node takes part in load balancing and distributing
activities on different nodes.
• Mixed Approach
– Combination of the above two approaches.
Resources that can be balanced
• The following network resources can be load
balanced:
– Network interfaces and services such as DNS, FTP, and
HTTP
– Connections through intelligent switches
– Processing through computer system assignment
– Storage resources
– Access to application instances
Load Balancing
• Without load balancing, cloud computing would
very difficult to manage.
• They determine the current utilization of the resources in their pool, the
response time, the work queue length, connection latency and capacity, and
other factors in order to assign tasks to each resource.
• When the query request arrives at its destination, a Google cluster is sent to a
load balancer which forward the request to Google squid server. This is the
second level of IP distribution, based on a measure of the current system
loading on proxy servers in the cluster.
• The Squid server checks its cache, and if it finds a match to the query, that
match is returned and the query has been satisfied. If there is no match in the
Squid cache, the query is sent to an individual Google Web Server based on
current Web server utilizations, which is the third level of network load
balancing, again based on utilization rates.
Understanding Hypervisors
• Given a computer system with a certain set of resources, you
can set aside portions of those resources to create a virtual
machine.
• The system imaging program is used to make this image and can
be used later to restore a system image.
• Users get full root access and can install almost any OS or
application in their AMIs