SlideShare a Scribd company logo
Eucalyptus,
Nimbus &
OpenNebula
About Us
Amar Myana Latika Patil
I’m a Software Developer I’m a Software Developer
I work at Security Brigade Infosec Pvt. Ltd. I work at TCS Consultancy Ltd.
I’m working from last 3 years. I’m working from last 2 years.
Abstract
• Eucalyptus, Nimbus & OpenNebula are major Open-Source
Cloud-Computing Software Platforms
• Manage the provisioning of virtual machines for a cloud
providing IaaS
• Commercial cloud services charge, by the hour, for CPU time
• It might be more cost effective for the organization to purchase
hardware to create its own private cloud.
• These software products are designed to allow an organization
to set up a private group of machines as their own cloud.
• These three frameworks represent three different points of
interest in the design space of this particular type of open-
source cloud.
Analysis
• We will discuss how these software frameworks act as
managers that stand in the middle of a number of other
software components.
• We will analyze how core decisions in the basic architecture and
overall structure of Eucalyptus, Nimbus and OpenNebula impact
the kind of settings and applications for which each framework
is most suitable.
• We will identify several opportunities for improving these
software stacks by identifying some of the challenges that are
common to all three.
The Cloud Computing Stack
• A quick overview of entire cloud computing software stack.
• In a generic open-source cloud computing system, we can
identify six basic components.
• First, we hardware and operating system that are on the various
physical machines in the system.
• The second component is the network. This includes the DNS,
DHCP and the subnet organization of the physical machines.
• The third component is the virtual machine hypervisor, (also
known as a Virtual Machine Monitor or VMM).
• The fourth component is an archive of VM disk images.
• The fifth component is the front-end for users.
• The last component is the cloud framework itself, where
Eucalyptus, OpenNebula and Nimbus are placed.
Eucalyptus
• EUCALYPTUS stands for Elastic Utility Computing Architecture
for Linking Your Program To Useful System.
• It is open source software that was developed by University of
California-Santa Barbara for Cloud Computing to implement
Infrastructure as a Service.
• Eucalyptus provide an EC2 -compatible cloud Computing
Platform and S3- compatible Cloud Storage thus its services are
available through EC2/S3 compatible APIs.
• The Eucalyptus system is composed of a 5 main components
interacting together; Client, Cloud Controller, Storage
Controller (Walrus), Cluster Controller and a Node Controller.
• Node Controller
• Is installed in each compute
node to control VM activities,
including the execution, inspe-
ction and termination of VM
instances.
• Cluster Controller
• Runs on 1 machine per cluster &
works as an intermediary betw-
een the cloud & node controller.
• Storage Controller
• Warlus is a component that provides storage services for storing virtual
machine images and user’s data.
• Cloud Controller
• It is the user’s entry point into the Eucalyptus system and only one instance
is run on the system. It provides users with a way managing the system.
• The cloud controller is built using the Enterprise service bus providing
decoupling from the services’ implementation.
• Client
• The client component provides the user with a way to access the
Eucalyptus system (cloud controller).
• Eucalyptus provides two interfaces;
• One is a WDSL which is a SOAP client interface similar to AWS EC2 interface
called euca2ools.
• Another interface is a HTTP query based interface.
Constructing a Virtual Machine:
1. A user uses the euca2ools front-end to request a VM.
2. The VM template disk image is pushed
to a compute node
3. This disk image is padded to the correct
size and packaged for use by the
hypervisor on the compute node.
4. The compute node sets up network bridging
to provide a virtual NIC with a virtual MAC.
5. On the head node the dhcp is set up with the
MAC/IP pair
6. VM is spawned on the VMM.
7. The user can now SSH directly into the VM.
Nimbus
• Nimbus is another open source IaaS implementation framework
which came online September 2005.
• Nimbus allows a client to lease remote resources by deploying
virtual machines (VMs) on those resources and configuring
them to represent an environment desired by the user.
• It was formerly known as the "Virtual Workspace Service" (VWS)
but the "workspace service" is technically just one the
components in the software collection.
• Nimbus was designed with the goal of turning clusters into
clouds mainly to be used in scientific applications.
System Architecture And Design
• The design of Nimbus which consists of a number of components
based on the web service technology:
1. Workspace Service
• Allows clients to manage and administer VMs by providing to two interfaces;
1. One interface is based on the web service resource framework (WSRF)
2. The other is based on EC2 WSDL.
2. Workspace Resource Manager
• Implements VM instance creation on a site and management.
3. Workspace Pilot
• Provides virtualization with significant changes to the site configurations.
4. Workspace Control
• Implements VM instance management such as start, stop and pause VM. It also
provides image management and sets up networks and provides IP assignment.
5. Context Broker
• Allows clients coordinate large virtual cluster launches automatically and repeatedly.
6. Workspace Client
• A complex client that provides full access to the workspace service functionality.
7. Cloud Client
• A simpler client providing access to selected functionalities in the workspace service.
8. Storage Service
• Cumulus is a web service providing users with storage capabilities to store images
and works in conjunction with GridFTP.
Constructing A Virtual Machine:
1. A user uses cloud-client to request a VM.
2. Nimbus will SSH into a compute node.
3. The VM template disk image is pushed to the
compute node.
4. On the compute node, the disk image is
padded to the correct size and configured.
5. The compute node sets up network bridging
to provide a virtual NIC with a virtual MAC.
6. A dhcp server on the compute node is
configured with a MAC/IP pair.
7. VM is spawned on the VMM.
8. The user can now SSH directly into the VM.
OpenNebula
• OpenNebula tends to a greater level of centralization and
customizability (especially for end-users).
• The idea of OpenNebula is a pure private cloud, in which users
actually log into the head node to access cloud functions.
• OpenNebula, by default, uses a shared file system, typically NFS, for
all disk images files and all files for actually running the OpenNebula
functions.
• In order to spawn a VM, the user provides a configuration file
containing parameters which would be fed into the VMM command
line. This allows for memory, processor, network and disk resources
to be requested for essentially any configuration.
• OpenNebula is also very centralized, especially in its default
Constructing A Virtual Machine
1. A user uses ssh to login to the head node.
2. The user uses the onevm command to request a VM.
3. The VM template disk image is copied and a copy
is padded to the correct size and configuration within
the NFS directory on the head node.
4. The one process on the head node uses ssh to log into a
compute node.
5. The compute node sets up network bridging to provide a
virtual NIC with a virtual MAC.
6. Files needed by the VMM on the compute node will be
pulled to the compute node via the NFS.
7. VM is spawned on the VMM.
8. The user can now SSH directly into the VM.
SUMMARY
Eucalyptus OpenNebula Nimbus
Philosophy Mimic Amazon EC2 Private, highly
customizable cloud
Cloud resources
tailored to scientific
researchers
Customizability Some for admin,
less for user
Basically everything Many parts except
for image storage
and globus
credentials
DHCP On cluster controller Variable On individual
compute node
Internal Security Tight. Root required
for many things.
Looser, but can be
made more tight if
needed.
Fairly tight, unless
deploying a fully
private cloud.
User Security Users are given
custom credentials
via a web interface
User logs into head Users x509
credential is
registered with
cloud
An Ideal Setting Large group of Smaller group of Deploy for less to
THANK YOU
Ad

More Related Content

What's hot (20)

Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
GOVERNMENT COLLEGE OF ENGINEERING,TIRUNELVELI
 
Underlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computingUnderlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computing
GOVERNMENT COLLEGE OF ENGINEERING,TIRUNELVELI
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
Jacob Zvirikuzhe
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
OECLIB Odisha Electronics Control Library
 
cluster computing
cluster computingcluster computing
cluster computing
anjalibhandari11011995
 
Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
Piyush Rochwani
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
Haitham Ahmed
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
Abhishek Dey
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
Thanakrit Lersmethasakul
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
NIKHILKUMAR SHARDOOR
 
On demand provisioning
On demand provisioningOn demand provisioning
On demand provisioning
GOVERNMENT COLLEGE OF ENGINEERING,TIRUNELVELI
 
MapReduce Programming Model
MapReduce Programming ModelMapReduce Programming Model
MapReduce Programming Model
AdarshaDhakal
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
kumari36
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
vinitha96
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
Nikunj Dhameliya
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
gaurav jain
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
ijtsrd
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
Haitham Ahmed
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
Abhishek Dey
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
Thanakrit Lersmethasakul
 
MapReduce Programming Model
MapReduce Programming ModelMapReduce Programming Model
MapReduce Programming Model
AdarshaDhakal
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
kumari36
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
vinitha96
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
gaurav jain
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
ijtsrd
 

Viewers also liked (7)

OpenNebulaConf2017EU: IPP Cloud by Jimmy Goffaux, IPPON
OpenNebulaConf2017EU: IPP Cloud by Jimmy Goffaux, IPPONOpenNebulaConf2017EU: IPP Cloud by Jimmy Goffaux, IPPON
OpenNebulaConf2017EU: IPP Cloud by Jimmy Goffaux, IPPON
OpenNebula Project
 
Cloud Computing Architecture with Open Nebula - HPC Cloud Use Cases - NASA A...
Cloud Computing Architecture with Open Nebula  - HPC Cloud Use Cases - NASA A...Cloud Computing Architecture with Open Nebula  - HPC Cloud Use Cases - NASA A...
Cloud Computing Architecture with Open Nebula - HPC Cloud Use Cases - NASA A...
Ignacio M. Llorente
 
OpenNebulaConf2017EU: Alternative Context for Windows by Paul Batchelor, Blac...
OpenNebulaConf2017EU: Alternative Context for Windows by Paul Batchelor, Blac...OpenNebulaConf2017EU: Alternative Context for Windows by Paul Batchelor, Blac...
OpenNebulaConf2017EU: Alternative Context for Windows by Paul Batchelor, Blac...
OpenNebula Project
 
CloudOpen 2012 OpenNebula talk
CloudOpen 2012 OpenNebula talkCloudOpen 2012 OpenNebula talk
CloudOpen 2012 OpenNebula talk
OpenNebula Project
 
Opennebula instalação
Opennebula instalaçãoOpennebula instalação
Opennebula instalação
Luís Eduardo
 
OpenNebulaConf2017EU: Rudder by Florian, Heigl
OpenNebulaConf2017EU: Rudder by Florian, HeiglOpenNebulaConf2017EU: Rudder by Florian, Heigl
OpenNebulaConf2017EU: Rudder by Florian, Heigl
OpenNebula Project
 
OpenNebula 4.14 Hands-on Tutorial
OpenNebula 4.14 Hands-on TutorialOpenNebula 4.14 Hands-on Tutorial
OpenNebula 4.14 Hands-on Tutorial
OpenNebula Project
 
OpenNebulaConf2017EU: IPP Cloud by Jimmy Goffaux, IPPON
OpenNebulaConf2017EU: IPP Cloud by Jimmy Goffaux, IPPONOpenNebulaConf2017EU: IPP Cloud by Jimmy Goffaux, IPPON
OpenNebulaConf2017EU: IPP Cloud by Jimmy Goffaux, IPPON
OpenNebula Project
 
Cloud Computing Architecture with Open Nebula - HPC Cloud Use Cases - NASA A...
Cloud Computing Architecture with Open Nebula  - HPC Cloud Use Cases - NASA A...Cloud Computing Architecture with Open Nebula  - HPC Cloud Use Cases - NASA A...
Cloud Computing Architecture with Open Nebula - HPC Cloud Use Cases - NASA A...
Ignacio M. Llorente
 
OpenNebulaConf2017EU: Alternative Context for Windows by Paul Batchelor, Blac...
OpenNebulaConf2017EU: Alternative Context for Windows by Paul Batchelor, Blac...OpenNebulaConf2017EU: Alternative Context for Windows by Paul Batchelor, Blac...
OpenNebulaConf2017EU: Alternative Context for Windows by Paul Batchelor, Blac...
OpenNebula Project
 
CloudOpen 2012 OpenNebula talk
CloudOpen 2012 OpenNebula talkCloudOpen 2012 OpenNebula talk
CloudOpen 2012 OpenNebula talk
OpenNebula Project
 
Opennebula instalação
Opennebula instalaçãoOpennebula instalação
Opennebula instalação
Luís Eduardo
 
OpenNebulaConf2017EU: Rudder by Florian, Heigl
OpenNebulaConf2017EU: Rudder by Florian, HeiglOpenNebulaConf2017EU: Rudder by Florian, Heigl
OpenNebulaConf2017EU: Rudder by Florian, Heigl
OpenNebula Project
 
OpenNebula 4.14 Hands-on Tutorial
OpenNebula 4.14 Hands-on TutorialOpenNebula 4.14 Hands-on Tutorial
OpenNebula 4.14 Hands-on Tutorial
OpenNebula Project
 
Ad

Similar to Eucalyptus, Nimbus & OpenNebula (20)

Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
karthik s
 
Cloud using opennebulla for research work.pptx
Cloud using opennebulla for research work.pptxCloud using opennebulla for research work.pptx
Cloud using opennebulla for research work.pptx
pradeena937556
 
Unit-2-PPT-VIrtual Machine Provisioning-Context-final (1).pptx
Unit-2-PPT-VIrtual Machine Provisioning-Context-final (1).pptxUnit-2-PPT-VIrtual Machine Provisioning-Context-final (1).pptx
Unit-2-PPT-VIrtual Machine Provisioning-Context-final (1).pptx
letheya
 
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
mame_2030
 
The life cycle of a virtual machine (VM) provisioning process
The life cycle of a virtual machine (VM) provisioning processThe life cycle of a virtual machine (VM) provisioning process
The life cycle of a virtual machine (VM) provisioning process
Hitesh Mohapatra
 
Survey of open source cloud architectures
Survey of open source cloud architecturesSurvey of open source cloud architectures
Survey of open source cloud architectures
abhinav vedanbhatla
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
Ayaz Shahid
 
comparative study of Cloud computing tools
comparative study of Cloud computing tools comparative study of Cloud computing tools
comparative study of Cloud computing tools
Aditya Trivedi
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
Nishant Munjal
 
Module 2 Azure Services for Web Developement.pdf
Module 2 Azure Services for Web Developement.pdfModule 2 Azure Services for Web Developement.pdf
Module 2 Azure Services for Web Developement.pdf
trwdcn
 
2VM Provisioning (1)hhdzcfgdtetsrtr.pptx
2VM Provisioning (1)hhdzcfgdtetsrtr.pptx2VM Provisioning (1)hhdzcfgdtetsrtr.pptx
2VM Provisioning (1)hhdzcfgdtetsrtr.pptx
bhaskarkumar0125
 
Get superior performance with auto scalable e nlight managed cloud
Get superior performance with auto scalable e nlight managed cloudGet superior performance with auto scalable e nlight managed cloud
Get superior performance with auto scalable e nlight managed cloud
manoharparakh
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdf
ErvisTema1
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
XanGwaps
 
2 vm provisioning
2 vm provisioning2 vm provisioning
2 vm provisioning
ROSHNI PRADHAN
 
vm provisioning
vm provisioningvm provisioning
vm provisioning
ROSHNI PRADHAN
 
cloudcomputingmodule2virtualizationbossss
cloudcomputingmodule2virtualizationbosssscloudcomputingmodule2virtualizationbossss
cloudcomputingmodule2virtualizationbossss
leomessiatny
 
Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
Dr. Sunil Kr. Pandey
 
CLOUD COMPUTING In Brief UNIT I PPT.pptx
CLOUD COMPUTING In Brief UNIT I PPT.pptxCLOUD COMPUTING In Brief UNIT I PPT.pptx
CLOUD COMPUTING In Brief UNIT I PPT.pptx
DheekshithaPasala
 
Tuning VIM performance for unikernels
Tuning VIM performance for unikernelsTuning VIM performance for unikernels
Tuning VIM performance for unikernels
Stefano Salsano
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
karthik s
 
Cloud using opennebulla for research work.pptx
Cloud using opennebulla for research work.pptxCloud using opennebulla for research work.pptx
Cloud using opennebulla for research work.pptx
pradeena937556
 
Unit-2-PPT-VIrtual Machine Provisioning-Context-final (1).pptx
Unit-2-PPT-VIrtual Machine Provisioning-Context-final (1).pptxUnit-2-PPT-VIrtual Machine Provisioning-Context-final (1).pptx
Unit-2-PPT-VIrtual Machine Provisioning-Context-final (1).pptx
letheya
 
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
mame_2030
 
The life cycle of a virtual machine (VM) provisioning process
The life cycle of a virtual machine (VM) provisioning processThe life cycle of a virtual machine (VM) provisioning process
The life cycle of a virtual machine (VM) provisioning process
Hitesh Mohapatra
 
Survey of open source cloud architectures
Survey of open source cloud architecturesSurvey of open source cloud architectures
Survey of open source cloud architectures
abhinav vedanbhatla
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
Ayaz Shahid
 
comparative study of Cloud computing tools
comparative study of Cloud computing tools comparative study of Cloud computing tools
comparative study of Cloud computing tools
Aditya Trivedi
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
Nishant Munjal
 
Module 2 Azure Services for Web Developement.pdf
Module 2 Azure Services for Web Developement.pdfModule 2 Azure Services for Web Developement.pdf
Module 2 Azure Services for Web Developement.pdf
trwdcn
 
2VM Provisioning (1)hhdzcfgdtetsrtr.pptx
2VM Provisioning (1)hhdzcfgdtetsrtr.pptx2VM Provisioning (1)hhdzcfgdtetsrtr.pptx
2VM Provisioning (1)hhdzcfgdtetsrtr.pptx
bhaskarkumar0125
 
Get superior performance with auto scalable e nlight managed cloud
Get superior performance with auto scalable e nlight managed cloudGet superior performance with auto scalable e nlight managed cloud
Get superior performance with auto scalable e nlight managed cloud
manoharparakh
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdf
ErvisTema1
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
XanGwaps
 
cloudcomputingmodule2virtualizationbossss
cloudcomputingmodule2virtualizationbosssscloudcomputingmodule2virtualizationbossss
cloudcomputingmodule2virtualizationbossss
leomessiatny
 
CLOUD COMPUTING In Brief UNIT I PPT.pptx
CLOUD COMPUTING In Brief UNIT I PPT.pptxCLOUD COMPUTING In Brief UNIT I PPT.pptx
CLOUD COMPUTING In Brief UNIT I PPT.pptx
DheekshithaPasala
 
Tuning VIM performance for unikernels
Tuning VIM performance for unikernelsTuning VIM performance for unikernels
Tuning VIM performance for unikernels
Stefano Salsano
 
Ad

Recently uploaded (20)

Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Expand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchangeExpand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchange
Fexle Services Pvt. Ltd.
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
F-Secure Freedome VPN 2025 Crack Plus Activation  New VersionF-Secure Freedome VPN 2025 Crack Plus Activation  New Version
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
saimabibi60507
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025
kashifyounis067
 
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software DevelopmentSecure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Shubham Joshi
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Expand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchangeExpand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchange
Fexle Services Pvt. Ltd.
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
F-Secure Freedome VPN 2025 Crack Plus Activation  New VersionF-Secure Freedome VPN 2025 Crack Plus Activation  New Version
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
saimabibi60507
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025
kashifyounis067
 
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software DevelopmentSecure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Shubham Joshi
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 

Eucalyptus, Nimbus & OpenNebula

  • 2. About Us Amar Myana Latika Patil I’m a Software Developer I’m a Software Developer I work at Security Brigade Infosec Pvt. Ltd. I work at TCS Consultancy Ltd. I’m working from last 3 years. I’m working from last 2 years.
  • 3. Abstract • Eucalyptus, Nimbus & OpenNebula are major Open-Source Cloud-Computing Software Platforms • Manage the provisioning of virtual machines for a cloud providing IaaS • Commercial cloud services charge, by the hour, for CPU time • It might be more cost effective for the organization to purchase hardware to create its own private cloud. • These software products are designed to allow an organization to set up a private group of machines as their own cloud. • These three frameworks represent three different points of interest in the design space of this particular type of open- source cloud.
  • 4. Analysis • We will discuss how these software frameworks act as managers that stand in the middle of a number of other software components. • We will analyze how core decisions in the basic architecture and overall structure of Eucalyptus, Nimbus and OpenNebula impact the kind of settings and applications for which each framework is most suitable. • We will identify several opportunities for improving these software stacks by identifying some of the challenges that are common to all three.
  • 5. The Cloud Computing Stack • A quick overview of entire cloud computing software stack. • In a generic open-source cloud computing system, we can identify six basic components.
  • 6. • First, we hardware and operating system that are on the various physical machines in the system. • The second component is the network. This includes the DNS, DHCP and the subnet organization of the physical machines. • The third component is the virtual machine hypervisor, (also known as a Virtual Machine Monitor or VMM). • The fourth component is an archive of VM disk images. • The fifth component is the front-end for users. • The last component is the cloud framework itself, where Eucalyptus, OpenNebula and Nimbus are placed.
  • 7. Eucalyptus • EUCALYPTUS stands for Elastic Utility Computing Architecture for Linking Your Program To Useful System. • It is open source software that was developed by University of California-Santa Barbara for Cloud Computing to implement Infrastructure as a Service. • Eucalyptus provide an EC2 -compatible cloud Computing Platform and S3- compatible Cloud Storage thus its services are available through EC2/S3 compatible APIs. • The Eucalyptus system is composed of a 5 main components interacting together; Client, Cloud Controller, Storage Controller (Walrus), Cluster Controller and a Node Controller.
  • 8. • Node Controller • Is installed in each compute node to control VM activities, including the execution, inspe- ction and termination of VM instances. • Cluster Controller • Runs on 1 machine per cluster & works as an intermediary betw- een the cloud & node controller. • Storage Controller • Warlus is a component that provides storage services for storing virtual machine images and user’s data. • Cloud Controller • It is the user’s entry point into the Eucalyptus system and only one instance is run on the system. It provides users with a way managing the system.
  • 9. • The cloud controller is built using the Enterprise service bus providing decoupling from the services’ implementation. • Client • The client component provides the user with a way to access the Eucalyptus system (cloud controller). • Eucalyptus provides two interfaces; • One is a WDSL which is a SOAP client interface similar to AWS EC2 interface called euca2ools. • Another interface is a HTTP query based interface.
  • 10. Constructing a Virtual Machine: 1. A user uses the euca2ools front-end to request a VM. 2. The VM template disk image is pushed to a compute node 3. This disk image is padded to the correct size and packaged for use by the hypervisor on the compute node. 4. The compute node sets up network bridging to provide a virtual NIC with a virtual MAC. 5. On the head node the dhcp is set up with the MAC/IP pair 6. VM is spawned on the VMM. 7. The user can now SSH directly into the VM.
  • 11. Nimbus • Nimbus is another open source IaaS implementation framework which came online September 2005. • Nimbus allows a client to lease remote resources by deploying virtual machines (VMs) on those resources and configuring them to represent an environment desired by the user. • It was formerly known as the "Virtual Workspace Service" (VWS) but the "workspace service" is technically just one the components in the software collection. • Nimbus was designed with the goal of turning clusters into clouds mainly to be used in scientific applications.
  • 12. System Architecture And Design • The design of Nimbus which consists of a number of components based on the web service technology: 1. Workspace Service • Allows clients to manage and administer VMs by providing to two interfaces; 1. One interface is based on the web service resource framework (WSRF) 2. The other is based on EC2 WSDL.
  • 13. 2. Workspace Resource Manager • Implements VM instance creation on a site and management. 3. Workspace Pilot • Provides virtualization with significant changes to the site configurations. 4. Workspace Control • Implements VM instance management such as start, stop and pause VM. It also provides image management and sets up networks and provides IP assignment. 5. Context Broker • Allows clients coordinate large virtual cluster launches automatically and repeatedly. 6. Workspace Client • A complex client that provides full access to the workspace service functionality. 7. Cloud Client • A simpler client providing access to selected functionalities in the workspace service. 8. Storage Service • Cumulus is a web service providing users with storage capabilities to store images and works in conjunction with GridFTP.
  • 14. Constructing A Virtual Machine: 1. A user uses cloud-client to request a VM. 2. Nimbus will SSH into a compute node. 3. The VM template disk image is pushed to the compute node. 4. On the compute node, the disk image is padded to the correct size and configured. 5. The compute node sets up network bridging to provide a virtual NIC with a virtual MAC. 6. A dhcp server on the compute node is configured with a MAC/IP pair. 7. VM is spawned on the VMM. 8. The user can now SSH directly into the VM.
  • 15. OpenNebula • OpenNebula tends to a greater level of centralization and customizability (especially for end-users). • The idea of OpenNebula is a pure private cloud, in which users actually log into the head node to access cloud functions. • OpenNebula, by default, uses a shared file system, typically NFS, for all disk images files and all files for actually running the OpenNebula functions. • In order to spawn a VM, the user provides a configuration file containing parameters which would be fed into the VMM command line. This allows for memory, processor, network and disk resources to be requested for essentially any configuration. • OpenNebula is also very centralized, especially in its default
  • 16. Constructing A Virtual Machine 1. A user uses ssh to login to the head node. 2. The user uses the onevm command to request a VM. 3. The VM template disk image is copied and a copy is padded to the correct size and configuration within the NFS directory on the head node. 4. The one process on the head node uses ssh to log into a compute node. 5. The compute node sets up network bridging to provide a virtual NIC with a virtual MAC. 6. Files needed by the VMM on the compute node will be pulled to the compute node via the NFS. 7. VM is spawned on the VMM. 8. The user can now SSH directly into the VM.
  • 17. SUMMARY Eucalyptus OpenNebula Nimbus Philosophy Mimic Amazon EC2 Private, highly customizable cloud Cloud resources tailored to scientific researchers Customizability Some for admin, less for user Basically everything Many parts except for image storage and globus credentials DHCP On cluster controller Variable On individual compute node Internal Security Tight. Root required for many things. Looser, but can be made more tight if needed. Fairly tight, unless deploying a fully private cloud. User Security Users are given custom credentials via a web interface User logs into head Users x509 credential is registered with cloud An Ideal Setting Large group of Smaller group of Deploy for less to