0% found this document useful (0 votes)
15 views

Cloud Computing Unit 2

Unit II of the document discusses cloud computing architecture, focusing on the cloud lifecycle management, phases of cloud development, and the roles of various cloud models and services. It outlines the components of cloud architecture, including front-end and back-end elements, and details different deployment models such as private, public, hybrid, and community clouds. Additionally, it emphasizes the importance of cloud modeling and design principles, highlighting cost efficiency, scalability, and the transformative potential of cloud computing.

Uploaded by

karthiksenbagam5
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Cloud Computing Unit 2

Unit II of the document discusses cloud computing architecture, focusing on the cloud lifecycle management, phases of cloud development, and the roles of various cloud models and services. It outlines the components of cloud architecture, including front-end and back-end elements, and details different deployment models such as private, public, hybrid, and community clouds. Additionally, it emphasizes the importance of cloud modeling and design principles, highlighting cost efficiency, scalability, and the transformative potential of cloud computing.

Uploaded by

karthiksenbagam5
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

UNIT-II CLOUD COMPUTING IIIBSC(CS)

UNIT – II

Cloud Computing Architecture: Cloud Computing Technology – Cloud


Architecture – Cloud Modeling and Design - Virtualization : Foundation –
Grid, Cloud and Virtualization – Virtualization and Cloud Computing.

1)Cloud Computing Architecture:

Cloud computing technology:

Cloud lifecycle model:

The lifecycle management of cloud is so efficient that the IT sector can easily
achieve the primary goals of a cloud environment such as cost savings and optimal
use of resources.

Cloud lifecycle management provides:

● Ease in administrating cloud and service portal

● Manageable service

● Established multi-tenancy

● Include performance and capacity management

● Support heterogeneity.

Cloud lifecycle working group documents the observations for effective modelling
and thereby helps in understanding the dynamical and thermo dynamical processes
of the clouds in climate and weather analyses models.

The objectives of this working group are as follows:

● To identify questions related to cloud lifecycles.

● To maximize the efforts of the investigator by answering the questions.

● To make understanding easy for cloud lifecycle process by prioritizing the


strategies and observational data.

MP Page 1
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Phases of CDLC:

i)Requirement and Analysis

Requirement and analysis method is used to evaluate and understand the


requirements of an end user.

This is done by taking up the significant complaints from the user, network
solution, management and customers of the present system.

ii)Architect:
The structural behaviour of the cloud architecture gives solution to the cloud
system which comprises of on-premise resource, cloud resources, cloud services,
cloud middleware, software components, data server location and externally visible
properties of data server location.

Figure 5.2 shows that the components of cloud architecture are reference
architecture, technical architecture and deployment and operational architecture.

MP Page 2
UNIT-II CLOUD COMPUTING IIIBSC(CS)

iii)Implementation and Integration:

Third phase of CDLC is the actual formation and enablement of the private, public,
community, hybrid, inter and hosted cloud solutions to a computing problem.

Implementation: Events such as privacy, protection, regular, legality, mentality,


inter-machine message and privacy theory are addressed within the implementation
phase.

Integration: Integration is intermediate between the source and target systems for
extracting data, mediating and publishing it.

Five possibilities and recommendations for integrating into cloud effectively


are as follows:

1. Plan and set realistic goals


2. Learn from other’s experience
3. Require IT specialist team
4. Address security concerns
5. Maximize connectivity options

iv) Quality Assurance and Verification:

In this phase, cloud auditing is done to ensure the quality of the cloud network. It
also confirms the performance, reliability, availability, elasticity and safety of
cloud network at the service level.

MP Page 3
UNIT-II CLOUD COMPUTING IIIBSC(CS)

v)Deploy, Testing and Improvement:

Different platform service providers drastically reduce the deployment cost of the
application by pre-building and pre-configuring a stack of application
infrastructure in this phase.

vi)Monitor, Migrate and Audit:

This phase is marked by periodically monitoring the cloud environment and


measuring the performance of the system. The extra cost and worth that a client
incurs moving to cloud from the traditional SOA method and furthermore
integration with the existing methods are considered in this phase

Cloud Management Lifecycle:

The enterprise manager (Figure 5.3) manages the lifecycle such as planning,
setting up, building, testing and deploying, monitoring, managing, metering,
charging and optimizating.

• Planning: Enterprise manager helps in creating a cloud set-up with brand


new hardware, new software and even a new data centre.

• Set-up: Enterprise manager adopts the IaaS, PaaS and DBaaS model clouds
and the various services offered by these models.

• Building: Packing and publishing of applications are done with the help of
the available cloud computing services.

• Testing and deploying: After building an application, it has to be tested.


The testing portfolio available in enterprise manager does this job. The
resultant changes due to the testing are stored in the database. Testing also
estimates the load capacity after deployment.

• Monitoring and managing: It monitors the settings, standards, policies and


organizes for better management.

• Metering, charging and optimization: Usage of resources such as CPU,


storage (GB) and memory are to be metered and charged accordingly.

MP Page 4
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Cloud life cycle:

Reference Book: A.Srinivasan and J.Suresh, “Cloud Computing – A Practical


Approach for Learning and Implementation”, Pearson India Publications 2014.

Role Of Cloud Modelling And Architecture:

1. Cloud Computing Model:

Cloud computing model supports convenient, on-demand software using the


Internet. The computing devices used are released after usage without any manual
intervention. The model for cloud computing supports the availability comprising
of five required characteristics, four deployments and three service structures.

Necessary Characteristics:

• On-demand self-service: Any customers can unilaterally use computing


capabilities such as network storage and server time as desired without
human interaction with every service provider.

• Broad network access: Services are networked and can be accessed over
standard mechanisms which promote use in mixed thick or thin user
platforms (e.g., handheld devices such as mobile phones, laptops and PDAs).

MP Page 5
UNIT-II CLOUD COMPUTING IIIBSC(CS)

• Resource pooling: Resources of providers are grouped to serve multiple


users by means of a multi-tenant structure along with different virtual and
physical resources assigned dynamically.

• Rapid elasticity: Services can be run elastically and rapidly to speed up


scale out and fast release. As for the customer, the services available for
running often, appear to be unlimited that can be bought in any amount at
any point of time.

• Measured service: In cloud system, controlling and optimization of


resources happen automatically and it is done by controlling and metering at
some stage of abstraction appropriate to the kind of service, for example, the
bandwidth, processing, storage and accounts of active users.

Service Models:

• Cloud software as a service: These are capabilities provided to the


customer to deploy applications in the infrastructure provided by the service
provider. Deployed applications can be accessed by any device supported by
WWW. In this case, controlling or managing the network, server, operating
systems, storage, memory or even single application with the possible
payment of user-specific application setting and configuration are not done
by the customer.

• Cloud platform as a service: The service includes installation on the cloud


system infrastructure created by the user itself or is an acquired application
that may be written in some programming language using tools that are
supported and/or provided by the service provider. The end user does not
control or manage the infrastructure of cloud computing system that
comprises servers, networks storages or operating systems.

• Cloud infrastructure as a service: In this, same capabilities and resources


are provided but the consumer can deploy and run the software. The user
does not control the infrastructure.
Deployment Models:
Private cloud: These are functions within the organization and behind the firewall.
Community cloud: This cloud infrastructure is common to several organizations.
Public cloud: This cloud infrastructure is available to public or large industries.
Hybrid cloud: It is a composite of two and more clouds.

MP Page 6
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Reference Model For Cloud Computing:


A reference architecture (RA) provides the blueprint and/or architecture reused by
others with some changes. A reference model (RM) explains what the reference
architecture comprises and its various relationships. RA and RM help cloud
computing in terms of quick formation of framework.

A reference framework consists of reference model, reference architecture, process


and organization. Reference model takes care of laying foundations in principal
and designs models such as meta model, maturity model and capability model.

Reference architecture is divided into two parts:


1. Views in-terms of business, implementation, deployment and technology
2. Practice in-terms of standards, patterns, deliverables and models

Process does decomposition of the given job and sequences it. Organization
specifies the roles and responsibilities of the in-house staff according to their skills.
The advantage of this framework is that elements can be mapped in different ways,
that is, different problem scenarios and solutions, but a single framework.

Reference Book: A.Srinivasan and J.Suresh, “Cloud Computing – A Practical


Approach for Learning and Implementation”, Pearson India Publications 2014.

MP Page 7
UNIT-II CLOUD COMPUTING IIIBSC(CS)

2)CLOUD ARCHITECTURE:

• Cloud computing technology is used by both small and large organizations


to store the information in cloud and access it from anywhere at any time
using the internet connection.
• Cloud computing architecture is a combination of service-oriented
architecture and event-driven architecture.

Cloud computing architecture is divided into the following two parts -

• Front End
• Back End

Front End

• The front end is used by the client. It contains client-side interfaces and
applications that are required to access the cloud computing platforms.
• The front end includes web servers (including Chrome, Firefox, internet
explorer, etc.), thin & fat clients, tablets, and mobile devices.

Back End

MP Page 8
UNIT-II CLOUD COMPUTING IIIBSC(CS)

• The back end is used by the service provider. It manages all the resources
that are required to provide cloud computing services.
• It includes a huge amount of data storage, security mechanism, virtual
machines, deploying models, servers, traffic control mechanisms, etc.

Components of Cloud Computing Architecture

1. Client Infrastructure

Client Infrastructure is a Front end component. It provides GUI (Graphical User


Interface) to interact with the cloud.

2. Application

The application may be any software or platform that a client wants to access.

3. Service

A Cloud Services manages that which type of service you access according to the
client’s requirement.

Cloud computing offers the following three type of services:

i) Software as a Service (SaaS) – It is also known as cloud application services.


Mostly, SaaS applications run directly through the web browser means we do not
require to download and install these applications. Some important example of
SaaS is given below –

Example: Google Apps, Salesforce Dropbox, Slack, Hubspot, Cisco WebEx.

ii) Platform as a Service (PaaS) – It is also known as cloud platform services. It


is quite similar to SaaS, but the difference is that PaaS provides a platform for
software creation, but using SaaS, we can access software over the internet without
the need of any platform.

Example: Windows Azure, Force.com, Magento Commerce Cloud, OpenShift.

MP Page 9
UNIT-II CLOUD COMPUTING IIIBSC(CS)

iii) Infrastructure as a Service (IaaS) – It is also known as cloud infrastructure


services. It is responsible for managing applications data, middleware, and runtime
environments.

Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE),
Cisco Metapod.

iv). Runtime Cloud

Runtime Cloud provides the execution and runtime environment to the virtual
machines.

v) Storage

Storage is one of the most important components of cloud computing. It provides a


huge amount of storage capacity in the cloud to store and manage data.

vi) Infrastructure

It provides services on the host level, application level, and network level. Cloud
infrastructure includes hardware and software components such as servers, storage,
network devices, virtualization software, and other storage resources that are
needed to support the cloud computing model.

vii)Management

Management is used to manage components such as application, service, runtime


cloud, storage, infrastructure, and other security issues in the backend and establish
coordination between them.

viii)Security

Security is an in-built back end component of cloud computing. It implements a


security mechanism in the back end.

ix)Internet

The Internet is medium through which front end and back end can interact and
communicate with each other.

MP Page 10
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Factors to be considered while designing cloud-based architectures are


highlighted as follows:

Cost: Clearly understand the pricing details for various cloud models.

Complexity: Analyse the complexity before customizing the cloud solution and
check the requirements thoroughly before deployment.

Speed: Check the speed for cloud model. Speed in terms of advanced CPU
architecture, high memory, lowest latency and network infrastructure.

Cloud portability: Check the portability. This allows the consumer to move from
one vendor to another without making much changes in the architecture.

Security: Check for the security measurements provided by the vendor.

Single Cloud Site Architectures:

• In the single cloud site architecture, load balancer, application logic,


databases and storage are located in the cloud, that is, the load balancing
server, application server and database server.
• If the user is only testing the interactivity between the tiers, he may use
this architecture to cut-short the resources costs.

MP Page 11
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Multi-datacentre Architecture:

• If the cloud infrastructure has many datacentres, it is recommended to


distribute the system architecture to the datacentres for redundancy and
protection.
• It shows the multiple datacentre architecture in which it has two datacentres,
each having a load balancing applications, volume and master database.
When one datacentre goes down, then automatically the other datacentre can
be used.

MP Page 12
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Reference Book: A.Srinivasan and J.Suresh, “Cloud Computing – A Practical


Approach for Learning and Implementation”, Pearson India Publications 2014.

Cloud deployment model:

• It works as your virtual computing environment with a choice of deployment


model depending on how much data you want to store and who has access to
the Infrastructure.

MP Page 13
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Different Types Of Cloud Computing Deployment Models:

Private Cloud:

• Private cloud infrastructure is dedicated to a single organization. It is not


shared with other organizations.
• Private cloud can be owned or leased. It can be managed by the IT
organization or a vendor, who provided the service and can exist at on-
premises or off-premises.
• Private cloud is more expensive and secure compared to the public cloud.
Private cloud are flexible and service based. Firewall protects private cloud
from outsiders. It can be accessed by users within the organization via the
intranet.

MP Page 14
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Public Cloud :

• Adopting public cloud type has an advantage in terms of cost, deploy time.
Public cloud infrastructure is offered via web applications and also as web
services over the Internet to the public.
• Example of public cloud are CRM, Messaging and Microsoft Office
products. In this environment the service provider have control over their
clients.

Hybrid Cloud:

• It is a combination of private, public and community cloud service


deployment models.
• Security is given more important in private cloud than in public cloud. A
combination of a public and a private cloud is put together for the purpose of
keeping business-critical data and services in their control on private cloud
and outsourcing less-critical processing to the public cloud.

MP Page 15
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Community Cloud:

IT organizations share the infrastructure using community cloud as shown in


Figure 6.8. Community cloud supports a particular community, that has common
issues such as security requirements, missions, compliances, considerations and
policies.

MP Page 16
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Combined Cloud :

• Combining internal and external providers termed as combined cloud. By


integrating multiple cloud services, consumers can ease the transition to
public cloud services.

Inter Cloud (Cloud of Clouds):

• Mesh of cloud is called as inter cloud, which is interconnected using open


standards to provide a universal acceptance.

Cloud Deployment Models:

3)CLOUD MODELLING AND DESIGN:


• Cloud computing is a means to reduce cost and complexity of the IT, and
helps to optimize the workload in hand. Cloud computing uses the
infrastructure designed especially to work on the vast computing services
with limited resources.

MP Page 17
UNIT-II CLOUD COMPUTING IIIBSC(CS)

• The rapid growth of cloud computing offers efficiency in cost saving for
businesses and individual users.
• The main advantages of cloud are ability to scale data storage and dynamic
computing power saving cost.
These benefits will
• Improve government services and citizens’ access.
• Transform businesses.
• Provide new innovations to customers.
• Create energy savings.

Key Principles of Cloud Computing:


• Three key principles of cloud computing are abstraction, automation and
elasticity.
Abstraction:

• IT providers are in need of standardizing their IT operations, so optimizing


their operation will be made easy. Cloud computing gives some basic but
well-defined services.
• Managing the software services is passed onto the developer or user. A well-
defined abstraction layer acts a as grease between clouds and developers or
users, which helps to work efficiently and independent of each other.

The three abstraction layers in clouds are:

1. Application as a Service (AaaS)

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS)

Automation:

• The developers or users have complete control over their resources, this is
said to be automation in the cloud. There is no human interaction, even from
a developer’s or user’s side.
• In this environment, when the user needs more servers, the load balancer
intimates the cloud as to the extra numbers be provided. There is no need to
wait for unpacking, connect your machine and install, all will be done
automatically.

MP Page 18
UNIT-II CLOUD COMPUTING IIIBSC(CS)

• This automatic process reduces cost and complexity, and it puts the
developer or user in control.
• Now the user can reduce his time to market for the next rollout because, he
can do it himself, no intervention of professionals needed or waiting period.

Elasticity:

• Elasticity is the ability to quickly expand or decrease computer processing,


memory, and storage resources to meet changing demands without worrying
about capacity planning and engineering for peak usage.
• Using elasticity, people can easily scale up and down according to their daily
usage.

Model for Federated Cloud Computing:

Cloud Federation:

• Cloud federation is interconnecting the cloud computing environments with


two or more service providers for balancing the traffic load and to surge
spikes while there is demand.
• Cloud federation offers two benefits to the cloud providers. First, it
generates revenues from the idle computer resources to providers. Second, it
enables providers to move across borders.
• Federation acts as a bridge between two cloud environments.
• Enterprise users analyze them in terms of application and not in terms of
federation.

Two-layer Connectivity for Cloud Federation:

• Using multiple clouds and multiple applications based on business needs


• Allocating components to an application in different environments
• Moving an application based on their requirements and lifecycle stages
• Moving workloads closer to consumers

MP Page 19
UNIT-II CLOUD COMPUTING IIIBSC(CS)

CLOUD ECOSYSTEM MODEL:

• Cloud ecosystem is a term, which defines the complexity of the systems in


terms of its interdependent components that work together to enable cloud
services.
• The complex inhabitants of organisms and its running as an ecological unit
is said to be the ecosystem. In cloud computing, convoluted period
encompasses not only customary components, for example programs and
infrastructure, but furthermore advisors, integrators, partners and vendors.

Cloud Broker/Cloud Agent:

● A cloud broker is a third-party person or commerce, that acts as an officer


between the consumer and sellers.
● A cloud broker is a software application, that facilitates the sharing of work
between various cloud service providers. Another name for cloud broker is cloud
agent.
● The broker’s job may be to basically save the clientele time by examining
services from assorted vendors and imparting the customer with knowledge about
how to use cloud computing to support the enterprise. Cloud broker, in addition,
gives the buyer supplementary
services such as reproduction and security in terms of encryption.

Cloud Outlook:

• We can experience a phenomenal growth in the coming years in cloud


adoption and implementations, etc. Figure shows the same. Areas such as
big cloud data, business cloud, mobile cloud and gamification cloud are the
key trends. The following are the areas that highlight the key trends.

MP Page 20
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Big Data Cloud:

• The amount of data created and replicated in 2012 surpassed 1.9 ZB. It is
estimated by IDC that the total size of data in the universe will reach 9 ZB
within four years and nearly 21% of the information will be touched by the
cloud.
• The big data cloud enables an economical way to extract value from very
large volumes of data by high-velocity capture, discovery, transformation
and analysis.

Business Cloud:
• Business cloud is not like SaaS, PaaS, IaaS and BPaaS. It is more than that.

Mobile Cloud
• Mobile applications will continue to develop with the social pressure, which
will accelerate the progress of cloud computing to empower the users and
increase consumerization anybody, anywhere, anytime and any device. The
mobile cloud will push several organizations to reorganize their business
models.

Gamification Cloud:
• The gamification cloud will make technology edutainment, guide a
participant with a path to mastery and autonomy, encourage users to involve
in desired behaviours and make use of human psychological predisposition
to engage in gaming.

MP Page 21
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Cloud Unified Process (CUP):


• We need to fundamentally re-engineer the way we design, configure, teach,
adopt and deploy process, said Ivar Jacobson, inventor of UML (unified
modelling language).
• This becomes true for cloud computing paradigm. A complete process
model for systematic cloud adoption and deployment is lacking. This leads
to the need for a cloud unified process (CUP). An end-to-end iterative and
incremental process structure for the development and operations of cloud
services in a lifecycle fashion is called as CUP.
• The main characteristics are goal-oriented, use case-focused, role-based,
architecture-centric, risk-aware, iteration-centred, model-driven, product-
neutral, vendor-agnostic and technology-independent.

The CUP framework is composed of a hierarchical structure. The top level of


CUP comprises five components:
1. Strategize,
2. Transform,
3. Operationalize,
4. Run and
5. Enrich (STORE)

MP Page 22
UNIT-II CLOUD COMPUTING IIIBSC(CS)

• To develop a unified road mapping structure that systemizes the


comprehensive strategization and operationalization of cloudification, four
incremental stages are needed: plan, adopt, transform and harness (PATH).
• The best road mapping practices to execute PATH are: alignment, blueprint,
checklist and discipline (ABCD).

Reference Book: A.Srinivasan and J.Suresh, “Cloud Computing – A Practical


Approach for Learning and Implementation”, Pearson India Publications 2014.

CLOUD GOVERNANCE:

Taking Steps to Clarify Cloud Governance:

• The concept of ‘governance’ means different opinions for different people.


However, governance has to play a crucial role in the cloud computing.
• Cloud services are standardized and are delivered as a service. The services
are executed rapidly and delivered out from an infrastructure with high
elasticity and scalability and also as a pay-as-you-go model.
• Governance in the cloud means service level must be more important.
Developers must know about their provider’s SLAs.
• IT organizations are ready to adopt the benefits of cloud computing, it is
important that they do it in a right way aligning with IT governance
strategies.

SOA and Cloud Governance:

• Cloud availability
• Cloud security
• Erosion of data integrity
• Data replication and consistency issues
• Potential loss of privacy
• Lack of auditing and logging visibility
• Potential for regulatory violations
• Application sprawl and dependencies
MP Page 23
UNIT-II CLOUD COMPUTING IIIBSC(CS)

• Inappropriate usage of services

Cloud Governance: Design Time


• Designing services for deployment in the cloud is much like designing
services for SOA. In the early days of SOA development, IT organization
faced an incompatible, unwanted bunch of web services on the network, the
same is true for cloud services.

• In cloud computing SOA governance tools are missing. There is no


dedicated central point for a cloud consumer or developer regarding
services and its policies. Furthermore, design-time policies are easily
breakable and quality assurance process are lacking in cloud computing
environment. Hence design-time policies are to be enforced on the client
side and
• IT needs to provide a standard, service-centric across the enterprise data
centre and the cloud.

Cloud Governance: Run Time

• Run-time policy issues are complicating the cloud computing infrastructure.


Furthermore, all the systems are not having the same security standards. This
means that security policies need to be more granular. Users cannot count
on using area-based approaches to secure data or service access.

• The cloud does not simplify security issues, instead it complicates them.
Security approaches in SOA like ‘trust nobody’ approach can be adopted in
cloud to enforce security policies.

• An effective cloud governance approach must provide to control, monitor


and adopt services, both in on-premises and off-premises.

Stages of a Service Lifecycle: SOA and Cloud

• In the life of every SOA-enabled or cloud service, there are 11 stages that
can help to identify the difference between the services and business agility.

They are: SOA adoption planning, service inventory analysis, service-oriented


analysis (service modelling),service-oriented design or service contract, service
logic design, service development, service testing, service deployment and

MP Page 24
UNIT-II CLOUD COMPUTING IIIBSC(CS)

maintenance, service usage and monitoring, service discovery and service


versioning and retirement.

Successful Cloud Governance and Adoption:

The following are 10 tips to be followed for a successful cloud governance:

1. Start with enforcement


2. Form factors
3. Distributed, virtualized management
4. Maintaining record for critical assets
5. Loose coupling
6. Deploy globally, but acts locally
7. Global view in terms of application network
8. Flexibility
9. Applying lessons learned in SOA
10. Applying the solution in the cloud.

4)Virtualization:
• Virtualization is the "creation of a virtual (rather than actual) version of
something, such as a server, a desktop, a storage device, an operating system
or network resources".
• Virtualization is a technique, which allows to share a single physical
instance of a resource or an application among multiple customers and
organizations.
• It does by assigning a logical name to a physical storage and providing a
pointer to that physical resource when demanded.

MP Page 25
UNIT-II CLOUD COMPUTING IIIBSC(CS)

VIRTUALIZATION IN GRID:

Grid Computing:

• The main focal point in grid computing lies in secure resource sharing in
accessing computers, software and data in a dynamic atmosphere. Sharing of
those resources has to be fine-tuned and handled in a highly controlled
manner.

Three points to describe a grid:

1. Nontrivial qualities of service delivery

2. Habit of using standards in all places

3. Resources coordination

MP Page 26
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Using Virtualization in Grid Computing

● Virtualization integration and grid computing can be encouraged at various


levels.

• Grid Computing Level


• LRMS Level
• Virtual Machines

Types of Virtualization:

1. Hardware Virtualization.
2. Operating system Virtualization.
3. Server Virtualization.
4. Storage Virtualization.

Reference Book: A.Srinivasan and J.Suresh, “Cloud Computing – A Practical


Approach for Learning and Implementation”, Pearson India Publications 2014.

MP Page 27
UNIT-II CLOUD COMPUTING IIIBSC(CS)

1) Hardware Virtualization:

When the virtual machine software or virtual machine manager (VMM) is directly
installed on the hardware system is known as hardware virtualization. The main
job of hypervisor is to control and monitoring the processor, memory and other
hardware resources. After virtualization of hardware system we can install
different operating system on it and run different applications on those OS.

Usage:

Hardware virtualization is mainly done for the server platforms, because


controlling virtual machines is much easier than controlling a physical server.

Advantages of Hardware Virtualization

i) More Efficient Resource Utilization:

Physical resources can be shared among virtual machines. Although the unused
resources can be allocated to a virtual machine and that can be used by other
virtual machines if the need exists.

ii) Lower Overall Costs Because Of Server Consolidation:

Now it is possible for multiple operating systems can co-exist on a single hardware
platform, so that the number of servers, rack space, and power consumption drops
significantly.

iii) Increased Uptime Because Of Advanced Hardware Virtualization


Features:

The modern hypervisors provide highly orchestrated operations that maximize the
abstraction of the hardware and help to ensure the maximum uptime. These
functions help to migrate a running virtual machine from one host to another
dynamically, as well as maintain a running copy of virtual machine on another
physical host in case the primary host fails.

MP Page 28
UNIT-II CLOUD COMPUTING IIIBSC(CS)

iv) Increased IT Flexibility:

Hardware virtualization helps for quick deployment of server resources in a


managed and consistent ways. That results in IT being able to adapt quickly and
provide the business with resources needed in good time.

2.Software Virtualization:

Managing applications and distribution becomes a typical task for IT departments.


Installation mechanism differs from application to application. Some programs
require certain helper applications or frameworks and these applications may have
conflict with existing applications.

Software virtualization is just like a virtualization but able to abstract the


software installation procedure and create virtual software installations.

Virtualized software is an application that will be "installed" into its own self-
contained unit.

Example of software virtualization is VMware software, virtual box etc. In the next
pages, we are going to see how to install linux OS and windows OS on VMware
application.

Advantages of Software Virtualization


i) Client Deployments Become Easier:

Copying a file to a workstation or linking a file in a network then we can easily


install virtual software.

ii) Easy to manage:

To manage updates becomes a simpler task. You need to update at one place and
deploy the updated virtual application to the all clients.

iii) Software Migration:

Without software virtualization, moving from one software platform to another


platform takes much time for deploying and impact on end user systems. With the
help of virtualized software environment the migration becomes easier.

MP Page 29
UNIT-II CLOUD COMPUTING IIIBSC(CS)

iv) Server Virtualization:

When the virtual machine software or virtual machine manager (VMM) is directly
installed on the Server system is known as server virtualization.

Server Virtualization is the process of dividing a physical server into several


virtual servers, called virtual private servers. Each virtual private server can run
independently.

The concept of Server Virtualization widely used in the IT infrastructure to


minimizes the costs by increasing the utilization of existing resources.

Types of Server Virtualization

1. Hypervisor

In the Server Virtualization, Hypervisor plays an important role. It is a layer


between the operating system (OS) and hardware.

There are two types of hypervisors.

o Type 1 hypervisor ( also known as bare metal or native hypervisors)


o Type 2 hypervisor ( also known as hosted or Embedded hypervisors)

MP Page 30
UNIT-II CLOUD COMPUTING IIIBSC(CS)

The hypervisor is mainly used to perform various tasks such as allocate physical
hardware resources (CPU, RAM, etc.) to several smaller independent virtual
machines, called "guest" on the host machine.

• Figure 8.8 illustrates the hypervisor approach to virtualization. Under


hypervisor level virtualization the host operating system contains an
administrative environment to manage and control multiple virtual machines
each containing a guest operating system.
• An administrative operating system and/or management console also runs on
top of the hypervisor in addition to the virtual machines which allows the
virtual machines to be administered by a system administrator.
• Hypervisor-based virtualization solutions include Xen, VMware ESX Server
and Microsoft’s Hyper-V technology.

2. Full Virtualization

• Full Virtualization uses a hypervisor to directly communicate with


the CPU and physical server. It provides the best isolation and security
mechanism to the virtual machines.
• The biggest disadvantage of using hypervisor in full virtualization is that a
hypervisor has its own processing needs, so it can slow down the application
and server performance.
• VMWare ESX server is the best example of full virtualization.

3. Para Virtualization

• Para Virtualization is quite similar to the Full Virtualization. The advantage


of using this virtualization is that it is easier to use, Enhanced
performance, and does not require emulation overhead. Xen primarily
and UML use the Para Virtualization.
MP Page 31
UNIT-II CLOUD COMPUTING IIIBSC(CS)

• The difference between full and pare virtualization is that, in para


virtualization hypervisor does not need too much processing power to
manage the OS.

4.Operating System Virtualization

• When the virtual machine software or virtual machine manager (VMM) is


installed on the Host operating system instead of directly on the hardware
system is known as operating system virtualization.

Usage:

• Operating System Virtualization is mainly used for testing the applications


on different platforms of OS.
• Operating system virtualization is also called as system-lever virtualization.
It is a server virtualization technology that divides one operating system
into multiple isolated user-space called virtual environments. The biggest
advantage of using server visualization is that it reduces the use of physical
space, so it will save money.
• Linux OS Virtualization and Windows OS Virtualization are the types of
Operating System virtualization.
• FreeVPS, OpenVZ, and Linux Vserver are some examples of System-
Level Virtualization.

MP Page 32
UNIT-II CLOUD COMPUTING IIIBSC(CS)

5. Hardware Assisted Virtualization

• Hardware Assisted Virtualization was presented by AMD and Intel. It is


also known as Hardware virtualization, AMD virtualization, and Intel
virtualization. It is designed to increase the performance of the processor.
• The advantage of using Hardware Assisted Virtualization is that it requires
less hypervisor overhead.

6. Kernel-Level Virtualization:

• Kernel-level virtualization is one of the most important types of server


virtualization. It is an open-source virtualization which uses
the Linux kernel as a hypervisor. The advantage of using kernel
virtualization is that it does not require any special administrative software
and has very less overhead.
• User Mode Linux (UML) and Kernel-based virtual machine are some
examples of kernel virtualization.

• In kernel level virtualization, the host operating system operates on a


specially customized kernel, which includes extensions designed to manage
and control several virtual machines each have a guest operating system.
• User Mode Linux (UML) and Kernel-based Virtual Machine (KVM) are
examples of kernel level virtualization technology.
• Hardware virtualization leverages virtualization characteristic construct into
the most recent generations of Intel and AMD CPU.

MP Page 33
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Advantages of Server Virtualization:

i)Independent Restart

In Server Virtualization, each server can be restart independently and does not
affect the working of other virtual servers.

ii)Low Cost

Server Virtualization can divide a single server into multiple virtual private
servers, so it reduces the cost of hardware components.

iii)Disaster Recovery

Disaster Recovery is one of the best advantages of Server Virtualization. In Server


Virtualization, data can easily and quickly move from one server to another and
these data can be stored and retrieved from anywhere.

iv)Faster deployment of resources

Server virtualization allows us to deploy our resources in a simpler and faster way.

v)Security

It allows uses to store their sensitive data inside the data centers.

Disadvantages of Server Virtualization:

There are the following disadvantages of Server Virtualization -

1. The biggest disadvantage of server virtualization is that when the server goes
offline, all the websites that are hosted by the server will also go down.
2. There is no way to measure the performance of virtualized environments.
3. It requires a huge amount of RAM consumption.
4. It is difficult to set up and maintain.
5. Some core applications and databases are not supported virtualization.
6. It requires extra hardware resources.

MP Page 34
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Uses of Server Virtualization:

o Server Virtualization is used in the testing and development environment.


o It improves the availability of servers.
o It allows organizations to make efficient use of resources.
o It reduces redundancy without purchasing additional hardware components.

Usage:

Server virtualization is done because a single physical server can be divided into
multiple servers on the demand basis and for balancing the load.

iv) Storage Virtualization:

Storage virtualization is the process of grouping the physical storage from multiple
network storage devices so that it looks like a single storage device.

Storage virtualization is also implemented by using software applications.

Usage:

Storage virtualization is mainly done for back-up and recovery purposes.

Virtualization work in cloud computing:

• The main usage of Virtualization Technology is to provide the


applications with the standard versions to their cloud users, suppose if the
next version of that application is released, then cloud provider has to
provide the latest version to their cloud users and practically it is possible
because it is more expensive.
• To overcome this problem we use basically virtualization technology, By
using virtualization, all severs and the software application which are
required by other cloud providers are maintained by the third party people,
and the cloud providers has to pay the money on monthly or annual basis.

MP Page 35
UNIT-II CLOUD COMPUTING IIIBSC(CS)

Reference Book: A.Srinivasan and J.Suresh, “Cloud Computing – A Practical


Approach for Learning and Implementation”, Pearson India Publications 2014.

MP Page 36

You might also like