SlideShare a Scribd company logo
Introduction
to Cloud
Computing
BCA(SEM: III) DIV-A
Bhuvanesh Hingal
(19030121024)
Vivek Singh
(19030121097)
Made By:-
Internet, it is a massive collection of networks where resources are globally
networked, in internet cloud computing it plays a most important role in order to
share the information and one of the important hi-tech in the cloud computing is
virtualization. Most of it is used to maintain the collection of IT resources which
are used by the cloud providers.
This presentation presents an overview of the cloud computing scenario. It
provides the types of cloud, different examples of the cloud services, different
enterprises in the field of cloud computing, overview of Virtualization,
Hypervisors, their types and example.
INTRODUCTION
What is an OS?
An Operating System (OS) is a software which acts as an interface between the
end user and the computer hardware.
Functions of an OS:
What is a Kernel?
The kernel is the central component of a computer operating systems. The only
job performed by the kernel is to manage the communication between the
software and the hardware. A kernel is like the nucleus of the computer.
OS Kernel Ring Diagram
Inter-Process Communication(IPC)
Inter Process Communication through shared memory is a concept where two or
more processes can access the common memory and communication is done via
this shared memory where change is made by one process can be viewed by
another process.
Shared Memory: The area of memory which is shared by two processes for
reading and writing. *ACID properties to prevent dirty data.
Semaphore Lock: Locks on a particular block in an OS to protect the read and
write.
In an OS, Data sharing is possible by means of the message queue, shared memory and
semaphore.
A B
C
A = B
Memory is allocated
B = C
Producer Message Queue
Consumer
A = C
Transitive Properties
Semaphore
Semaphore: It is simply a variable that is non-negative and shared between
threads. A semaphore is a signaling mechanism, and a thread that is waiting on a
semaphore can be signalled by another thread. It uses two atomic operation
1) Wait
2) Signal
for the process synchronization.
A semaphore allows or disallows access to the resource, which depends on how
it is set up.
Figure: - Shared Memory Architecture
Figure:- Shared Disc and Shared Nothing Architecture
Parallel Database Architectures
Shared Memory Architecture
In the shared-memory architecture, the entire memory, i.e main memory and disks are
shared by all the processors.
A special , fast interconnection network (eg. a high-speed bus) allows any processor to
access any part of the memory in parallel.
All processors are under the control of a single operating system which makes it easy to
deal with load balancing.
It is also very efficient since the processors can communicate via the main memory.
Shared Disc Architecture
In the shared-disc architecture , only discs are shared by all the processors through the
interconnection network.
The main memory is not shared : each processor has exclusive access to it’s (non-shared)
main memory.
Each processor-memory is under the control of its own copy of the operating system.
shared -disc has a number of advantages like lower cost , availability , load balancing and
easy migration.
But since any processor can cache the same disc page , a cache mechanism is necessary.
Shared Nothing Architecture
In the shared-nothing architecture , each node of processor , main memory and disc
communicates with other nodes through the interconnection network.
Each node is under the control of its own copy of the operating system and thus can be
viewed as a local site (with its own database and software) in a distributed database
system.
What is a Cloud?
Cloud is a cluster of resources , by which users can access application as utilities
via internet, which is stored in some remote location.
Cloud provides services over public networks or on private networks such as on
WAN, LAN or VPN.
Cloud is building cluster of resources over the network for accessibility.
Node A
Node C
Node B Time
Synchronization
☁ The node which initiates the transaction is known as coordinator.
☁ Other nodes which takes part in the transactions are named as subordinates.
What is Cloud Computing?
Cloud Computing is manipulating, configuring, and accessing the applications
online. It offers online data storage, infrastructure and application.
It is a combination of software and hardware based computing resources
delivered as a network service.
Data centres are the centralized locations where computing and networking
equipments are located for the purpose of collecting, storing, processing,
distributing or allowing access to data.
Virtualization
Virtualization is the process of separating the software layer of a computer or server from
the hardware layer of a computer or server. A new layer is placed between the two to act as
a go between.
This could also be explained as the creation of many virtual or artificial resources from one
physical resource (a computer or server) or the creation of one virtual or artificial resource
from one or more physical resources.
The virtualization concept can relate to various areas like networking, storage and
hardware.
The Virtualization enables one computer to carry out the job of multiple computers, with
the help of sharing resources of single hardware across several environs.
Hypervisor
Hypervisors are virtual machine monitors(VMM) that allow numerous virtual operating
systems to simultaneously run on a single computer system. These virtual machines are
also called guest machines and they all share the hardware of the physical machine like
processor, memory, storage and other associated resources. This improves and enhances
the utilization of resources.
The hypervisor isolates the primary host machine from the operating systems. The
hypervisor caters to the needs of a guest operating system and it also manages it
efficiently. Each virtual machine is independent body and does not interfere with each
other despite running on the same host machine. They are not at all connected to each
other. If at a time one of the virtual machines faces any issues or crashes, the other
machines continue to perform it as it is.
Types of Virtualization
There are mainly 2 types of virtualization :-
1. Full virtualization.
2. Para virtualization.
The full virtualization and paravirtualization are categorized under CPU
virtualization. These are mainly distinguished by the fact that in full
virtualization the unmodified OS is not aware about the virtualization and it uses
binary translation to trap the OS calls at the run time. Conversely, in
paravirtualization, the hypercalls are used in place of non-virtualizable OS
instructions and this whole process takes place at the compile time where these
instructions are handled.
Full Virtualization
Full virtualization is the first generation of the software solution regarding server virtualization and
developed in the year of 1966 by IBM. It works by merging the binary translation and the direct execution
where the guest OS is entirely separated from the elementary hardware and virtualization layer.
Therefore, whatever the virtual machines are producing a dynamic translator rewrites to the under-lining
hardware. It involves a lack of awareness at the guest OS end about its virtualization and modification is
inevitable.
The technologies provide full virtualization support are VMWare, ESXi and Microsoft virtual servers.
Each time an OS instruction is generated the hypervisor translates it during run-time quickly and caches
the outcome for the future references. While the user-level instructions are executed without
modification at native speed.
Para Virtualization
Paravirtualization is nothing but the interaction of the guest OS to the hypervisor in order to
boost performance and productivity. Unlike full virtualization, paravirtualization does not
implement complete isolation; instead, partial isolation is implemented in the approach. It
also alters OS kernel to substitute the hypercalls in place of non-virtualizable instructions.
The purpose of hypercalls is to interact with the virtualization layer hypervisor directly.
In paravirtualization, there are various functions performed by hypervisor such as the
arrangement of hypercalls interface for other crucial kernel functions like memory
management, time keeping and interrupt handling. The major merit of paravirtualization is
that it can easily reduce the virtualization overhead.
Conclusion :-
The full virtualization is different from paravirtualization because in full virtualization the
unmodified OS runs in a complete isolated way. On the other hand, in the paravirtualization, the
Virtual machine does not completely isolate the OS but modifies it in order to make it compatible
with the certain API’s.
Virtualization Vs. Cloud Computing
Though they are equally important technologies. Virtualization and cloud computing are not
interchangeable or the same. Virtualization is a software that makes computing
environments self sufficient and independent of physical infrastructure, while cloud
computing is a utility that performs shared computing resources(software and/or data) on
demand with the help of the Internet. As complementary solutions the organizations could
begin with virtualizing their servers and then moving towards cloud computing for even
better agility and self service.
☁ Virtualization is one of the integral parts of cloud computing that helps in the origination of cloud
computing.
☁ Cloud computing is based upon IaaS whereas virtualization works on SaaS.
Cloud Models
IaaS vs. PaaS vs. SaaS
IaaS is infrastructure hosted in the cloud. IaaS includes virtual servers and cloud
storage, cloud security, and access to data center resources (managed by the IaaS
provider).
IaaS: cloud-based services, pay-as-you-go for services such as storage, networking, and
virtualization. IaaS examples: AWS EC2, Rackspace, Google Compute Engine (GCE),
Digital Ocean, Magento 1 Enterprise Edition*.
Platform-as-a-Service (PaaS) is the next layer up from IaaS in the cloud computing service
model. It provides developers with a platform for building applications. Most PaaS offerings
include development tools, middleware, operating systems, databases and database
management, and infrastructure. A PaaS provider either manages the infrastructure
themselves or purchases it as a service from an IaaS provider.
PaaS: hardware and software tools available over the internet. PaaS examples: AWS Elastic
Beanstalk, Heroku, Windows Azure (mostly used as PaaS), Force.com, OpenShift, Apache
Stratos, Magento Commerce Cloud.
Software-as-a-Service (SaaS) is full applications hosted and managed in the cloud. SaaS users
subscribe to an application and access it over the Internet rather than purchasing it once and
installing it locally.
SaaS: software that’s available via a third-party over the internet. SaaS examples:
BigCommerce, Google Apps, Salesforce, Dropbox, MailChimp, ZenDesk, DocuSign, Slack,
Hubspot.
Security in cloud
Cloud security, also known as cloud computing security, consists of a set of policies,
controls, procedures and technologies that work together to protect cloud-based systems,
data, and infrastructure.
1. Keeping admins permission.
2. Firewall protection.
3. Distributive / hybrid storage.
4. Data backup.
5. Encryption.
6. Data privacy.
7. Keeping track of the access.
8. With the help of key-stone
tokens.
Security in cloud can be achieved by :-
01
COMPUTE
Memory, CPU
03
NETWORK
Pool of IP
addresses
02
STORAGE
Storage Devices
Terminology Used in Cloud Services
COMPUTE
Compute is a kind of service which takes care about the CPU, availability of resources,
memory and storage. It relates to the infrastructure and decides whether all the resources
are provided to the user/customer or not but never does the resource management, it is
done by other scheduler.
Compute instantiates the resources based upon the customer demands.
Compute interacts with the hypervisor and the resources to the compute are provided by
the hypervisor, thus cloud is going to get all the resources through compute.
☁ Compute ⇒ Cloud
☁ Hypervisor ⇒ OS
STORAGE
A kind of device (dump device) used to store the data. The storage is always going to be
limited in size. The storage component in the cloud services provides the data in a clustered
storage over the network which can be accessible to the customer from any geographical
location.
☁ Provides agility, global scale and durability, with “anytime, anywhere” data access.
Cloud storage is a cloud computing model that stores data on the Internet through a cloud
computing provider who manages and operates data storage as a service. It’s delivered on
demand with just-in-time capacity and costs, and eliminates buying and managing your own
data storage infrastructure.
NETWORK
Cloud needs to have a pool of IP addresses and the pool of IP addresses are going to be
provided by the hypervisor to the network services of the cloud.
Cloud networking is a type of infrastructure where network capabilities and resources are
available on demand through a third-party service provider that hosts them on a cloud
platform. The network resources can include virtual routers, firewalls, and bandwidth and
network management software, with other tools and functions becoming available as
required. Companies can either use cloud networking resources to manage an in-house
network or use the resources completely in the cloud.
☁ Advantages: Versatility, Speed, Reliability, Cost-saving.
OpenStack Core Services
★ Scalability :- It represents how the cloud environment can scale up itself so
that it can handle the multiple customer requirements.
★ Orchestration :- Even if a customer demands 100 different instances per
hour, the services should be able to handle those requirements as per the
user’s choice. Thus, the service which takes care of scaling up/down the
availability as per the requirement is termed as orchestration.
★ Telemetry Service :- As it is based upon pay-as-you-go model, it records the
resource usage statistics of individual customer and generates the bill.
★ Object Storage Service :- This service provides to store unstructured data.
★ Networking Service :- Pool of IP addresses are granted by OpenStack
networking service. It gives the traffic flow from the end user to the cloud
environment
Terminologies in OpenStack Platform
1. Compute ---> Nova
2. Block Storage ---> Cinder
3. Object Storage ---> Swift
4. Orchestration ---> Heat
5. Networking ---> Neutron
6. Image Storage ---> Glance
7. Identity and access management ---> Keystone
☁ Nova , Cinder , Swift , Heat , Neutron , Glance , Keystone these are the services
which provides functionalities respective to their belonging cloud services.
Request Flow for Provisioning Instance in OpenStack
OpenStack - Neutron - Networking Service
These are of mainly 3 types :-
1. Management Network.
2. Data Network.
3. External Network.
1. Management Network :-
It’s responsible to build communications channel between the different cloud services
(i.e : compute , storage , network).
1. Data Network:-
It’s a communication channel with the help of which multiple virtual machines can
interact with each other.
1. External Network:-
It’s a customer network by which the cloud is going to be accessed.
☁ All the different components of the cloud services interact with each other using a
network.
KEYSTONE
03
04
01 Simple/Plain Token
UUID: Universally Unique
Identifier
Compressed PKI
PKIZ
Cryptographically Signed Document
PKI: Public Key Infrastructure
Cryptographically Encrypted Token
Fernet
02
Token Formats:-
Introduction to Cloud Computing
What is a Fernet Key?
A fernet key is used to encrypt and decrypt fernet tokens. The keys are held in a
key repository that keystone passes to a library that handles the encryption and
decryption of tokens.
What are the different types of keys?
A key repository is required by keystone in order to create fernet tokens. These
keys are used to encrypt and decrypt the information that makes up the payload
of the token. Each key in the repository can have one of three states. The state of
the key determines how keystone uses a key with fernet tokens. The different
types are as follows:
★ Primary Key :-
There is only ever one primary key in a key repository. The primary key is allowed to encrypt and
decrypt tokens. This key is always named as the highest index in the repository.
★ Secondary Key:-
A secondary key was at one point a primary key, but has been demoted in place of another primary
key. It is only allowed to decrypt tokens. Since it was the primary at some point in time, its existence
in the key repository is justified. Keystone needs to be able to decrypt tokens that were created with
old primary keys.
★ Staged Key:-
The staged key is a special key that shares some similarities with secondary keys. There can only ever
be one staged key in a repository and it must exist. Just like secondary keys, staged keys have the
ability to decrypt tokens. Unlike secondary keys, staged keys have never been a primary key. In fact,
they are opposites since the staged key will always be the next primary key. This helps clarify the
name because they are the next key staged to be the primary key. This key is always named as 0 in
the key repository.
Cache of the token is kept here
and the token validation is
done here
Keystone
Middleware
☁ In UUID, keystone validates the token.
☁ In PKI, keystone middleware validates the token.
“Cloud is about how you do computing, not
where you do computing.”
Thank
You!
Introduction to Cloud Computing
Ad

More Related Content

What's hot (20)

1 virtualization
1 virtualization1 virtualization
1 virtualization
ROSHNI PRADHAN
 
Esx mem-osdi02
Esx mem-osdi02Esx mem-osdi02
Esx mem-osdi02
35146895
 
Operating system 16 virtual machines
Operating system 16 virtual machinesOperating system 16 virtual machines
Operating system 16 virtual machines
Vaibhav Khanna
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
Soumyajit Basu
 
Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?
Bangladesh Network Operators Group
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
rjain51
 
Distributed Server
Distributed ServerDistributed Server
Distributed Server
Rajan Kumar
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
HTS Hosting
 
Virtualization (Distributed computing)
Virtualization (Distributed computing)Virtualization (Distributed computing)
Virtualization (Distributed computing)
Sri Prasanna
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
Rishikese MR
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
IGZ Software house
 
9. virtualization virtualization
9. virtualization virtualization9. virtualization virtualization
9. virtualization virtualization
SagarR24
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
Siddharth Bhatt
 
Linux virtualization
Linux virtualizationLinux virtualization
Linux virtualization
Google
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
Prashant Tiwari
 
All About Virtualization
All About VirtualizationAll About Virtualization
All About Virtualization
EMC
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
Sarbjeet Singh
 
incs775_lect6.ppt
incs775_lect6.pptincs775_lect6.ppt
incs775_lect6.ppt
webhostingguy
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
Rubal Sagwal
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
Arun Gopinath
 
Esx mem-osdi02
Esx mem-osdi02Esx mem-osdi02
Esx mem-osdi02
35146895
 
Operating system 16 virtual machines
Operating system 16 virtual machinesOperating system 16 virtual machines
Operating system 16 virtual machines
Vaibhav Khanna
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
Soumyajit Basu
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
rjain51
 
Distributed Server
Distributed ServerDistributed Server
Distributed Server
Rajan Kumar
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
HTS Hosting
 
Virtualization (Distributed computing)
Virtualization (Distributed computing)Virtualization (Distributed computing)
Virtualization (Distributed computing)
Sri Prasanna
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
Rishikese MR
 
9. virtualization virtualization
9. virtualization virtualization9. virtualization virtualization
9. virtualization virtualization
SagarR24
 
Linux virtualization
Linux virtualizationLinux virtualization
Linux virtualization
Google
 
All About Virtualization
All About VirtualizationAll About Virtualization
All About Virtualization
EMC
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
Sarbjeet Singh
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
Rubal Sagwal
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
Arun Gopinath
 

Similar to Introduction to Cloud Computing (20)

Using virtualization technologies, Load balancing and virtualization,Understa...
Using virtualization technologies, Load balancing and virtualization,Understa...Using virtualization technologies, Load balancing and virtualization,Understa...
Using virtualization technologies, Load balancing and virtualization,Understa...
vidhyapm2
 
Cloudcpmuting journal
Cloudcpmuting journalCloudcpmuting journal
Cloudcpmuting journal
Priti Banya Mohanty
 
Cloud Computing Course Material - Virtualization
Cloud Computing Course Material -  VirtualizationCloud Computing Course Material -  Virtualization
Cloud Computing Course Material - Virtualization
Sathishkumar Jaganathan
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
Priti Banya Mohanty
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
SumitKumar918321
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
Dr. Sunil Kr. Pandey
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.raj
NRajaMohanReddy
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
Zarwashgulrez
 
Virtualization
VirtualizationVirtualization
Virtualization
Utkarsh Soni
 
virtualization-190329110832.pdf
virtualization-190329110832.pdfvirtualization-190329110832.pdf
virtualization-190329110832.pdf
AkshithaReddy42848
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
Mayank Aggarwal
 
sppu_TE_Comp_Cloud_computing_unit 3_cc.pptx
sppu_TE_Comp_Cloud_computing_unit 3_cc.pptxsppu_TE_Comp_Cloud_computing_unit 3_cc.pptx
sppu_TE_Comp_Cloud_computing_unit 3_cc.pptx
ericmyer1
 
SPPU_TE_COMPUTER_CLOUD_COMPUTING_unit 3.pptx
SPPU_TE_COMPUTER_CLOUD_COMPUTING_unit 3.pptxSPPU_TE_COMPUTER_CLOUD_COMPUTING_unit 3.pptx
SPPU_TE_COMPUTER_CLOUD_COMPUTING_unit 3.pptx
ericmyer1
 
Virtualization defined-wp
Virtualization defined-wpVirtualization defined-wp
Virtualization defined-wp
Suneel Dogra
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
AkshithaReddy42848
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of Virtualization
Elizabeth Anderson
 
A Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and ContainersA Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and Containers
prashant desai
 
Sna lab prj (1)
Sna lab prj (1)Sna lab prj (1)
Sna lab prj (1)
alihaider922341
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET Journal
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
shruti533256
 
Using virtualization technologies, Load balancing and virtualization,Understa...
Using virtualization technologies, Load balancing and virtualization,Understa...Using virtualization technologies, Load balancing and virtualization,Understa...
Using virtualization technologies, Load balancing and virtualization,Understa...
vidhyapm2
 
Cloud Computing Course Material - Virtualization
Cloud Computing Course Material -  VirtualizationCloud Computing Course Material -  Virtualization
Cloud Computing Course Material - Virtualization
Sathishkumar Jaganathan
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
Priti Banya Mohanty
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
Dr. Sunil Kr. Pandey
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.raj
NRajaMohanReddy
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
Zarwashgulrez
 
virtualization-190329110832.pdf
virtualization-190329110832.pdfvirtualization-190329110832.pdf
virtualization-190329110832.pdf
AkshithaReddy42848
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
Mayank Aggarwal
 
sppu_TE_Comp_Cloud_computing_unit 3_cc.pptx
sppu_TE_Comp_Cloud_computing_unit 3_cc.pptxsppu_TE_Comp_Cloud_computing_unit 3_cc.pptx
sppu_TE_Comp_Cloud_computing_unit 3_cc.pptx
ericmyer1
 
SPPU_TE_COMPUTER_CLOUD_COMPUTING_unit 3.pptx
SPPU_TE_COMPUTER_CLOUD_COMPUTING_unit 3.pptxSPPU_TE_COMPUTER_CLOUD_COMPUTING_unit 3.pptx
SPPU_TE_COMPUTER_CLOUD_COMPUTING_unit 3.pptx
ericmyer1
 
Virtualization defined-wp
Virtualization defined-wpVirtualization defined-wp
Virtualization defined-wp
Suneel Dogra
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
AkshithaReddy42848
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of Virtualization
Elizabeth Anderson
 
A Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and ContainersA Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and Containers
prashant desai
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET Journal
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
shruti533256
 
Ad

Recently uploaded (20)

Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Ad

Introduction to Cloud Computing

  • 2. BCA(SEM: III) DIV-A Bhuvanesh Hingal (19030121024) Vivek Singh (19030121097) Made By:-
  • 3. Internet, it is a massive collection of networks where resources are globally networked, in internet cloud computing it plays a most important role in order to share the information and one of the important hi-tech in the cloud computing is virtualization. Most of it is used to maintain the collection of IT resources which are used by the cloud providers. This presentation presents an overview of the cloud computing scenario. It provides the types of cloud, different examples of the cloud services, different enterprises in the field of cloud computing, overview of Virtualization, Hypervisors, their types and example. INTRODUCTION
  • 4. What is an OS? An Operating System (OS) is a software which acts as an interface between the end user and the computer hardware. Functions of an OS:
  • 5. What is a Kernel? The kernel is the central component of a computer operating systems. The only job performed by the kernel is to manage the communication between the software and the hardware. A kernel is like the nucleus of the computer.
  • 6. OS Kernel Ring Diagram
  • 7. Inter-Process Communication(IPC) Inter Process Communication through shared memory is a concept where two or more processes can access the common memory and communication is done via this shared memory where change is made by one process can be viewed by another process. Shared Memory: The area of memory which is shared by two processes for reading and writing. *ACID properties to prevent dirty data. Semaphore Lock: Locks on a particular block in an OS to protect the read and write.
  • 8. In an OS, Data sharing is possible by means of the message queue, shared memory and semaphore. A B C A = B Memory is allocated B = C Producer Message Queue Consumer A = C Transitive Properties
  • 9. Semaphore Semaphore: It is simply a variable that is non-negative and shared between threads. A semaphore is a signaling mechanism, and a thread that is waiting on a semaphore can be signalled by another thread. It uses two atomic operation 1) Wait 2) Signal for the process synchronization. A semaphore allows or disallows access to the resource, which depends on how it is set up.
  • 10. Figure: - Shared Memory Architecture Figure:- Shared Disc and Shared Nothing Architecture Parallel Database Architectures
  • 11. Shared Memory Architecture In the shared-memory architecture, the entire memory, i.e main memory and disks are shared by all the processors. A special , fast interconnection network (eg. a high-speed bus) allows any processor to access any part of the memory in parallel. All processors are under the control of a single operating system which makes it easy to deal with load balancing. It is also very efficient since the processors can communicate via the main memory.
  • 12. Shared Disc Architecture In the shared-disc architecture , only discs are shared by all the processors through the interconnection network. The main memory is not shared : each processor has exclusive access to it’s (non-shared) main memory. Each processor-memory is under the control of its own copy of the operating system. shared -disc has a number of advantages like lower cost , availability , load balancing and easy migration. But since any processor can cache the same disc page , a cache mechanism is necessary.
  • 13. Shared Nothing Architecture In the shared-nothing architecture , each node of processor , main memory and disc communicates with other nodes through the interconnection network. Each node is under the control of its own copy of the operating system and thus can be viewed as a local site (with its own database and software) in a distributed database system.
  • 14. What is a Cloud? Cloud is a cluster of resources , by which users can access application as utilities via internet, which is stored in some remote location. Cloud provides services over public networks or on private networks such as on WAN, LAN or VPN.
  • 15. Cloud is building cluster of resources over the network for accessibility. Node A Node C Node B Time Synchronization ☁ The node which initiates the transaction is known as coordinator. ☁ Other nodes which takes part in the transactions are named as subordinates.
  • 16. What is Cloud Computing? Cloud Computing is manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application. It is a combination of software and hardware based computing resources delivered as a network service. Data centres are the centralized locations where computing and networking equipments are located for the purpose of collecting, storing, processing, distributing or allowing access to data.
  • 17. Virtualization Virtualization is the process of separating the software layer of a computer or server from the hardware layer of a computer or server. A new layer is placed between the two to act as a go between. This could also be explained as the creation of many virtual or artificial resources from one physical resource (a computer or server) or the creation of one virtual or artificial resource from one or more physical resources. The virtualization concept can relate to various areas like networking, storage and hardware. The Virtualization enables one computer to carry out the job of multiple computers, with the help of sharing resources of single hardware across several environs.
  • 18. Hypervisor Hypervisors are virtual machine monitors(VMM) that allow numerous virtual operating systems to simultaneously run on a single computer system. These virtual machines are also called guest machines and they all share the hardware of the physical machine like processor, memory, storage and other associated resources. This improves and enhances the utilization of resources. The hypervisor isolates the primary host machine from the operating systems. The hypervisor caters to the needs of a guest operating system and it also manages it efficiently. Each virtual machine is independent body and does not interfere with each other despite running on the same host machine. They are not at all connected to each other. If at a time one of the virtual machines faces any issues or crashes, the other machines continue to perform it as it is.
  • 19. Types of Virtualization There are mainly 2 types of virtualization :- 1. Full virtualization. 2. Para virtualization. The full virtualization and paravirtualization are categorized under CPU virtualization. These are mainly distinguished by the fact that in full virtualization the unmodified OS is not aware about the virtualization and it uses binary translation to trap the OS calls at the run time. Conversely, in paravirtualization, the hypercalls are used in place of non-virtualizable OS instructions and this whole process takes place at the compile time where these instructions are handled.
  • 20. Full Virtualization Full virtualization is the first generation of the software solution regarding server virtualization and developed in the year of 1966 by IBM. It works by merging the binary translation and the direct execution where the guest OS is entirely separated from the elementary hardware and virtualization layer. Therefore, whatever the virtual machines are producing a dynamic translator rewrites to the under-lining hardware. It involves a lack of awareness at the guest OS end about its virtualization and modification is inevitable. The technologies provide full virtualization support are VMWare, ESXi and Microsoft virtual servers. Each time an OS instruction is generated the hypervisor translates it during run-time quickly and caches the outcome for the future references. While the user-level instructions are executed without modification at native speed.
  • 21. Para Virtualization Paravirtualization is nothing but the interaction of the guest OS to the hypervisor in order to boost performance and productivity. Unlike full virtualization, paravirtualization does not implement complete isolation; instead, partial isolation is implemented in the approach. It also alters OS kernel to substitute the hypercalls in place of non-virtualizable instructions. The purpose of hypercalls is to interact with the virtualization layer hypervisor directly. In paravirtualization, there are various functions performed by hypervisor such as the arrangement of hypercalls interface for other crucial kernel functions like memory management, time keeping and interrupt handling. The major merit of paravirtualization is that it can easily reduce the virtualization overhead.
  • 22. Conclusion :- The full virtualization is different from paravirtualization because in full virtualization the unmodified OS runs in a complete isolated way. On the other hand, in the paravirtualization, the Virtual machine does not completely isolate the OS but modifies it in order to make it compatible with the certain API’s.
  • 23. Virtualization Vs. Cloud Computing Though they are equally important technologies. Virtualization and cloud computing are not interchangeable or the same. Virtualization is a software that makes computing environments self sufficient and independent of physical infrastructure, while cloud computing is a utility that performs shared computing resources(software and/or data) on demand with the help of the Internet. As complementary solutions the organizations could begin with virtualizing their servers and then moving towards cloud computing for even better agility and self service. ☁ Virtualization is one of the integral parts of cloud computing that helps in the origination of cloud computing. ☁ Cloud computing is based upon IaaS whereas virtualization works on SaaS.
  • 25. IaaS vs. PaaS vs. SaaS IaaS is infrastructure hosted in the cloud. IaaS includes virtual servers and cloud storage, cloud security, and access to data center resources (managed by the IaaS provider). IaaS: cloud-based services, pay-as-you-go for services such as storage, networking, and virtualization. IaaS examples: AWS EC2, Rackspace, Google Compute Engine (GCE), Digital Ocean, Magento 1 Enterprise Edition*.
  • 26. Platform-as-a-Service (PaaS) is the next layer up from IaaS in the cloud computing service model. It provides developers with a platform for building applications. Most PaaS offerings include development tools, middleware, operating systems, databases and database management, and infrastructure. A PaaS provider either manages the infrastructure themselves or purchases it as a service from an IaaS provider. PaaS: hardware and software tools available over the internet. PaaS examples: AWS Elastic Beanstalk, Heroku, Windows Azure (mostly used as PaaS), Force.com, OpenShift, Apache Stratos, Magento Commerce Cloud. Software-as-a-Service (SaaS) is full applications hosted and managed in the cloud. SaaS users subscribe to an application and access it over the Internet rather than purchasing it once and installing it locally. SaaS: software that’s available via a third-party over the internet. SaaS examples: BigCommerce, Google Apps, Salesforce, Dropbox, MailChimp, ZenDesk, DocuSign, Slack, Hubspot.
  • 27. Security in cloud Cloud security, also known as cloud computing security, consists of a set of policies, controls, procedures and technologies that work together to protect cloud-based systems, data, and infrastructure. 1. Keeping admins permission. 2. Firewall protection. 3. Distributive / hybrid storage. 4. Data backup. 5. Encryption. 6. Data privacy. 7. Keeping track of the access. 8. With the help of key-stone tokens. Security in cloud can be achieved by :-
  • 28. 01 COMPUTE Memory, CPU 03 NETWORK Pool of IP addresses 02 STORAGE Storage Devices Terminology Used in Cloud Services
  • 29. COMPUTE Compute is a kind of service which takes care about the CPU, availability of resources, memory and storage. It relates to the infrastructure and decides whether all the resources are provided to the user/customer or not but never does the resource management, it is done by other scheduler. Compute instantiates the resources based upon the customer demands. Compute interacts with the hypervisor and the resources to the compute are provided by the hypervisor, thus cloud is going to get all the resources through compute. ☁ Compute ⇒ Cloud ☁ Hypervisor ⇒ OS
  • 30. STORAGE A kind of device (dump device) used to store the data. The storage is always going to be limited in size. The storage component in the cloud services provides the data in a clustered storage over the network which can be accessible to the customer from any geographical location. ☁ Provides agility, global scale and durability, with “anytime, anywhere” data access. Cloud storage is a cloud computing model that stores data on the Internet through a cloud computing provider who manages and operates data storage as a service. It’s delivered on demand with just-in-time capacity and costs, and eliminates buying and managing your own data storage infrastructure.
  • 31. NETWORK Cloud needs to have a pool of IP addresses and the pool of IP addresses are going to be provided by the hypervisor to the network services of the cloud. Cloud networking is a type of infrastructure where network capabilities and resources are available on demand through a third-party service provider that hosts them on a cloud platform. The network resources can include virtual routers, firewalls, and bandwidth and network management software, with other tools and functions becoming available as required. Companies can either use cloud networking resources to manage an in-house network or use the resources completely in the cloud. ☁ Advantages: Versatility, Speed, Reliability, Cost-saving.
  • 32. OpenStack Core Services ★ Scalability :- It represents how the cloud environment can scale up itself so that it can handle the multiple customer requirements. ★ Orchestration :- Even if a customer demands 100 different instances per hour, the services should be able to handle those requirements as per the user’s choice. Thus, the service which takes care of scaling up/down the availability as per the requirement is termed as orchestration. ★ Telemetry Service :- As it is based upon pay-as-you-go model, it records the resource usage statistics of individual customer and generates the bill. ★ Object Storage Service :- This service provides to store unstructured data. ★ Networking Service :- Pool of IP addresses are granted by OpenStack networking service. It gives the traffic flow from the end user to the cloud environment
  • 33. Terminologies in OpenStack Platform 1. Compute ---> Nova 2. Block Storage ---> Cinder 3. Object Storage ---> Swift 4. Orchestration ---> Heat 5. Networking ---> Neutron 6. Image Storage ---> Glance 7. Identity and access management ---> Keystone ☁ Nova , Cinder , Swift , Heat , Neutron , Glance , Keystone these are the services which provides functionalities respective to their belonging cloud services.
  • 34. Request Flow for Provisioning Instance in OpenStack
  • 35. OpenStack - Neutron - Networking Service These are of mainly 3 types :- 1. Management Network. 2. Data Network. 3. External Network.
  • 36. 1. Management Network :- It’s responsible to build communications channel between the different cloud services (i.e : compute , storage , network). 1. Data Network:- It’s a communication channel with the help of which multiple virtual machines can interact with each other. 1. External Network:- It’s a customer network by which the cloud is going to be accessed. ☁ All the different components of the cloud services interact with each other using a network.
  • 37. KEYSTONE 03 04 01 Simple/Plain Token UUID: Universally Unique Identifier Compressed PKI PKIZ Cryptographically Signed Document PKI: Public Key Infrastructure Cryptographically Encrypted Token Fernet 02 Token Formats:-
  • 39. What is a Fernet Key? A fernet key is used to encrypt and decrypt fernet tokens. The keys are held in a key repository that keystone passes to a library that handles the encryption and decryption of tokens. What are the different types of keys? A key repository is required by keystone in order to create fernet tokens. These keys are used to encrypt and decrypt the information that makes up the payload of the token. Each key in the repository can have one of three states. The state of the key determines how keystone uses a key with fernet tokens. The different types are as follows:
  • 40. ★ Primary Key :- There is only ever one primary key in a key repository. The primary key is allowed to encrypt and decrypt tokens. This key is always named as the highest index in the repository. ★ Secondary Key:- A secondary key was at one point a primary key, but has been demoted in place of another primary key. It is only allowed to decrypt tokens. Since it was the primary at some point in time, its existence in the key repository is justified. Keystone needs to be able to decrypt tokens that were created with old primary keys. ★ Staged Key:- The staged key is a special key that shares some similarities with secondary keys. There can only ever be one staged key in a repository and it must exist. Just like secondary keys, staged keys have the ability to decrypt tokens. Unlike secondary keys, staged keys have never been a primary key. In fact, they are opposites since the staged key will always be the next primary key. This helps clarify the name because they are the next key staged to be the primary key. This key is always named as 0 in the key repository.
  • 41. Cache of the token is kept here and the token validation is done here Keystone Middleware ☁ In UUID, keystone validates the token. ☁ In PKI, keystone middleware validates the token.
  • 42. “Cloud is about how you do computing, not where you do computing.”

Editor's Notes

  • #15: Let’s take an example: The Coronavirus outbreak forced people all over the world to stay at home; learn and work from home.