Lecture 1211
Lecture 1211
⚫Increased Security
The ability to control the execution of a guest in a completely
transparent manner opens new possibilities for delivering a secure,
controlled execution environment.
The virtual machine represents an emulated environment in which
the guest is executed. All the operations of the guest are generally
performed against the virtual machine, which then translates and
applies them to the host.
This level of indirection allows the VMM to control and filter the
activity of guest, thus preventing the harmful operations from being
performed.
Characteristics of Virtualized
Environment Cont..
• Managed Execution
Virtualization of the execution environment
does not only allow increased security but a
wider range of features can be implemented.
In particular, sharing, aggregation, emulation,
and isolation are the most relevant.
Characteristics of Virtualized
Environment Cont..
• Managed Execution includes following:
– Sharing
• Creating separate computing environment within the
same host.
• Underline host is fully utilized.
– Aggregation
• A group of separate hosts can be tied together and
represented as single virtual host.
– Emulation
• Controlling & Tuning the environment exposed to
guest.
– Isolation
• Complete separate environment for guests.
Managed Execution
Characteristics of Virtualized
Environment Cont..
● Performance Tuning –
– control the performance of guest.
● Virtual Machine Migration –
– move virtual image into another machine.
● Portability –
– safely moved and executed on top of different
virtual machine.
– Availability of system is with you.
3.3 Taxonomy of Virtualization
Techniques Cont..
• Virtualization is mainly used to emulate
execution environment, storage and
networks.
• Execution Environment classified into two :-
– Process-level – implemented on top of an existing
operating system.
– System-level – implemented directly on hardware
and do not or minimum requirement of existing
operating system
3.3 Taxonomy of Virtualization
Techniques Cont..
Machine Reference Model
● It defines the interfaces between the
levels of abstractions, which hide
implementation details.
● Virtualization techniques actually replace
one of the layers and intercept the calls
that are directed towards it.
Machine Reference Model [Cont.]
Interpretation
Binary Translation
Virtualization and Cloud
Computing
VM
VM VM VM VM VM
Server A Server B
(running) (running)
Before Migration
VM VM VM
VM VM VM
Server A Server B
(running) (inactive)
After Migration
Advantages of Virtualization
• It is distinguished by the notion that resources are virtual and limitless and
that details of the physical systems on which software runs are abstracted
from the user.
• Abstraction:
– Cloud computing abstracts the details of system implementation from
users and developers.
– Applications run on physical systems that aren't specified,
– data is stored in locations that are unknown,
– administration of systems is outsourced to others, and access by users
is ubiquitous.
• Virtualization:
– Cloud computing virtualizes systems by pooling and sharing resources.
– Systems and storage can be provisioned as needed from a centralized
infrastructure,
– costs are assessed on a metered basis,
– multi-tenancy is enabled,
– and resources are scalable with agility.
Cloud Types
• Deployment Model:
• Refers to location and management of the cloud’s infrastructure
• Service Model
• Consists of particular types of services that can be accessed on cloud computing
platform
• Private Cloud
– The private cloud infrastructure is operated for the exclusive use of an
organization. The cloud may be managed by that organization or a third
party. Private clouds may be either on- or off-premises.
• Hybrid Cloud
– A hybrid cloud combines multiple clouds (private, community of public) where
those clouds retain their unique identities, but are bound together as a unit.
• Community Cloud
– A community cloud is one where the cloud has been organized to serve a
common function or purpose.
– It may be for one organization or for several organizations, but they share
common concerns such as their mission, policies, security, regulatory compliance
needs, and so on
Service Models
• Infrastructure as a Service(IaaS)
– Deliver Infrastructure on Demand in the form of
virtual Hardware, Storage and Networking. Virtual
Hardware is utilised to provide compute on demand
in the form of virtual machine instances
– Eg.Amazon EC2,, Eucalyptus, GoGrid, Rightspace
Cloud
• Technologies such as cluster, grid, and now cloud computing, have all
aimed at allowing access to large amounts of computing power in a fully
virtualized manner, by aggregating resources and offering a single system
view
• BUYYA
• “Cloud is a parallel and distributed computing system consisting of a
collection of inter-connected and virtualized computers that are
dynamically provisioned and presented as one or more unified
computing resources based on service-level agreements (SLA)
established through negotiation between the service provider and
consumers.”
• NIST
• a pay-per-use model for enabling available, convenient, on-demand
network access to a shared pool of configurable computing resources
(e.g. networks, servers, storage, applications, services) that can be
rapidly provisioned and released with minimal management effort or
service provider interaction.”
Cloud Computing in a nutshell
• A key aspect of the grid vision realization has been building standard
Web services-based protocols that allow distributed resources to be
“discovered, accessed, allocated, monitored, accounted for, and billed
for..
• Issues:
• QOS, Avaibility of resource with diverse software configuration
• Soln: virtualisation
Utility Computing
• The service providers then attempt to maximize their own utility, where
said utility may directly correlate with their profit.
Hardware Virtualisation
• Hardware virtualization allows running multiple operating systems and
software stacks on a single physical platform
• VMWare ESXi :
• pioneer in virtualisation, bare metal hypervisor,
• provides advanced virtualization techniques of processor, memory, and
I/O. Especially, through memory ballooning and page sharing, it can
overcommit memory,
• Xen:
• open-source project
• It has pioneered the para-virtualization concept, on which the guest
operating system, by means of a specialized kernel, can interact with the
hypervisor, thus significantly improving performance
• KVM:
• Is has been part of the mainline Linux kernel since version 2.6.20, thus
being natively supported by several distributions.
• For instance, Amazon has its Amazon machine image (AMI) format,
made popular on the Amazon EC2 public cloud. Other formats are used
by Citrix XenServer, several Linux distributions that ship with KVM,
Microsoft Hyper-V, and VMware ESX
Autonomic Computing
• What kind of customers really benefit from migrating their IT into the
cloud ?
The Seven-Step Model of Migration into a Cloud
The Seven-Step Model of Migration into a Cloud
The Seven-Step Model of Migration into a Cloud
Step 1
• Cloud migration assessments comprise assessments to understand the
issues involved in the specific case of migration at the application level
or the code, the design, the architecture, or usage levels.
• These assessments are about the cost of migration as well as about the
ROI that can be achieved in the case of production version.
Step 2
• isolating all systemic and environmental dependencies of the enterprise
application components within the captive data center
Step 3
• generating the mapping constructs between what shall possibly remain
in the local captive data center and what goes onto the cloud.
The Seven-Step Model of Migration into a Cloud
Step 4
• substantial part of the enterprise application needs to be rearchitected,
redesigned, and reimplemented on the cloud
Step 5
• We leverage the intrinsic features of the cloud computing service to
augment our enterprise application in its own small ways.
Step 6
• we validate and test the new form of the enterprise application with an
extensive test suite that comprises testing the components of the
enterprise application on the cloud as well
Step 7
• Test results could be positive or mixed.
• In the latter case, we iterate and optimize as appropriate. After several
such optimizing iterations, the migration is deemed successful
The Seven-Step Model of Migration into a Cloud
These are the unique characteristics of an ideal cloud computing model:
• Low barrier to entry: You can gain access to systems for a small investment.
3. The peak of the sum is never greater than the sum of the peaks.
A cloud can deploy less capacity because the peaks of individual tenants
in a shared system are averaged over time by the group of tenants.
.
The law of cloudonomics
4. Aggregate demand is smoother than individual.
Multi-tenancy also tends to average the variability intrinsic in individual
demand. With a more predictable demand and less variation, clouds can
run at higher utilization rates than captive systems. This allows cloud
systems to operate at higher efficiencies and lower costs.
5. Average unit costs are reduced by distributing fixed costs over more units
of output.
Cloud vendors have a size that allows them to purchase resources at
significantly reduced prices.
Some completely new clients are under development that are specifically meant to
connect to the cloud. These clients have as their focus cloud applications and services,
and are often hardened and more securely connected. Two examples presented are
Jolicloud and Google Chrome OS. They represent a new client model that is likely to
have considerable impact.
Exploring the Cloud Computing
Stack
• Composability
• Infrastructure
• Platforms
• Virtual Appliances
• Communication Protocols
• Applications
Composability
Virtual machines are containers that are assigned specific resources. The software
that runs in the virtual machines is what defines the utility of the cloud computing
system.
Arch dig illustrates the Portion of
cloud computing stack that is
designated as the server
Platforms
• Platform in the cloud is a software layer that is
used to create higher levels of service.
• Salesforce.com's Force.com Platform
• Windows Azure Platform
• Google Apps and the Google AppEngine
A virtual appliance is software that installs as middleware onto a virtual machine.
Virtual Appliances
• Virtual appliances are software installed on virtual servers—application
modules that are meant to run a particular machine instance or image
type.
• A virtual appliance is a platform instance. Therefore, virtual appliances
occupy the middle of the cloud computing stack
Understanding Services and
Applications by Type
Types
• Infrastructure as a Service (IaaS)
• Software as a Service (SaaS)
• Platform as a Service (PaaS)
• Infrastructure as a Service allows for the
creation of virtual computing systems or
networks.
• Software as a Service represents a hosted
application that is universally available over
the Internet, usually through a browser.
• Software as a Service, the user interacts
directly with the hosted software.
• SaaS may be seen to be an alternative model
to that of shrink-wrapped software and may
replace much of the boxed software that we
buy today.
• Platform as a Service is a cloud computing
infrastructure that creates a development
environment upon which applications may be
build.
• Things you relate to: Your family and friends, a software license,
beliefs and values, activities and endeavors, personal selections and
choices, habits and practices, an iGoogle account, and more
Networked Identity Service
Classes
• To validate Web sites, transactions,
transaction participants, clients, and network
services—various forms of identity services—
have been deployed on networks.
• Ticket or token providing services, certificate
servers, and other trust mechanisms all
provide identity services that can be pushed
out of private networks and into the cloud.
Identity as a Service (IDaaS) may include any
of the following:
• Authentication services (identity verification)
• Directory services
• Federated identity
• Identity governance
• Identity and profile management
• Policies, roles, and enforcement
• Provisioning (external policy administration)
• Registration
• Risk and event monitoring, including audits
• Single sign-on services (pass-through authentication)
Identity System Codes of Conduct
• User control for consent: Users control their identity and must consent to
the use of their information.
• Minimal Disclosure: The minimal amount of information should be
disclosed for an intended use.
• Justifiable access: Only parties who have a justified use of the information
contained in a digital identity and have a trusted identity relationship with
the owner of the information may be given access to that information.
• Directional Exposure: An ID system must support bidirectional
identification for a public entity so that it is discoverable and a
unidirectional identifier for private entities, thus protecting the private ID.
• Interoperability: A cloud computing ID system must interoperate with
other identity services from other identity providers.
• Unambiguous human identification: An IDaaS application must provide
an unambiguous mechanism for allowing a human to interact with a
system while protecting that user against an identity attack.
• Consistency of Service: An IDaaS service must be simple to use, consistent
across all its uses, and able to operate in different contexts using different
technologies.
Compliance as a Service (CaaS)
• The laws of the country of a request's origin
may not match the laws of the country where
the request is processed, and it's possible that
neither location's laws match the laws of the
country where the service is provided.
• A Compliance as a Service application would need to serve
as a trusted third party, because this is a man-in-the-middle
type of service.