SlideShare une entreprise Scribd logo
1  sur  65
Jithin Parakka
Department of Computer Science
     Pondicherry University
•   Cloud Middleware
•   Amazon EC2
•   Eucalyptus
•   Openstack
•   Ubuntu Enterprise Cloud
•   Google App Engine
•   Approaches to enable multi-tenancy




                                         2
3
Middleware is a general term for any program that serves to "glue together"
or mediate between two separate and often already existing programs.

Cloud Middleware is software used to integrate services, applications and
content available on the cloud.




                                                                               4
Data management
Identity / security management
User interfaces and portals
Billing and metering
Management and monitoring




                                  5
Image Repository




User   Portal                         Compute Servers

                Cloud Controller




                                    Block Storage
       User
                                                        6
Image Repository




User   Portal                         Compute Servers

                Cloud Controller




                                    Block Storage

                                                        7
User




       8
Cloud Controller




VM     VM                 VM    VM

Node   Node              Node   Node


                                       9
Virtual      Virtual    Virtual
Virtual Machine      Machine      Machine    Machine
 Management

                                Hypervisor


                  Physical Hardware




                                                       10
Applications            Applications


    Gust OS                 Gust OS


Virtual Hardware        Virtual Hardware

     Virtual Machine Software Layer


       Physical Hardware

                                           11
Virtual machine talks to VMM which communicates with the hardware
platform
CPU understands the unmodified instructions generated by Virtualized
OS
Advantages
     Complete decoupling of the software from the hardware
     Complete isolation of different applications
Disadvantages
     VMM should provide additionally virtual bios, virtual memory space
     and virtual devices




                                                                           12
Applications            Applications

Applications
                    Gust OS                 Gust OS


  Host OS       Virtual Hardware        Virtual Hardware

                     Virtual Machine Software Layer


               Physical Hardware

                                                           13
Guest OS uses specialized API that talks to the VMM which sends the
virtualization requests to the hardware.
VMM does not need a resource intensive translation of instructions.
Advantages
     Near native performance
     Migration
Disadvantages
     Not applicable for Windows OS




                                                                       14
Allow multiple operating systems, termed guests, to run
concurrently on a host computer.




                                                           15
A software implementation of a computing environment in which an
operating system (OS) or program can be installed and run.
Typically emulates a physical computing environment.
Requests for CPU, memory, hard disk, network and other hardware
resources are managed by a virtualization layer which translates these
requests to the underlying physical hardware.
Advantages.
    Multiple OS environments can co-exist on the same computer.
    Application provisioning, maintenance, high availability and disaster
    recovery.
Disadvantages
    Security

                                                                             16
Look up and retrieval system for virtual machine images.




                                                            19
Contain Core Operating System and essential tools.
It’s a prototype from which virtual servers are created.
Can be obtained from public repository.
Or you can create yourself.
An image have unique ID and it is used to provision the image.
Contain three part
      Kernel Image.
      Ramdisk Image.
          Is an initial root file system that is mounted prior to when the real
          root file system is available
      Root File System image.


                                                                                   20
Create a virtual disk image
ˆ Installing the OS
ˆ Installing required applications
ˆ Make the OS ready to run on cloud
Registering the images with image repository
ˆ Testing the image




                                                21
22
Provide block level storage that you can mount from your instances.
You can format it as your wish.
 With multiple block you can create RAID.
You can take Snapshot of volume
    Back up.
    Replication.




                                                                       23
A GUI for users to access the cloud.
User can
    Launch Instances.
    Shut down or terminate.
    List available images.
    List running instances.
    Manage security groups.
    Manage block storage.
    Manage IP address.
    Create Key pairs.




                                        24
Elasticfox.
Hybridfox.

Authenticate using credentials.




                                   25
Euca2ools.
User can
    Launch Instances.
    Shut down or terminate.
    List available images.
    List running instances.
    Manage security groups.
    Manage block storage.
    Manage IP address.
    Create Key pairs.




                               26
Cryptographic Keypairs to verify access to instances.

Contain two keys
    Public key: saved within cloud.
    Private key: output to the user as character string.

Public key is injected to VM when instance starts.

When attempting to login to the VMinstance using SSH, the public key is
checked against your private key to verify access.




                                                                           27
A security group is a set of networking rules applied to instances.

When you first create an instance, it is assigned to a default security group
that denies incoming network traffic from all sources.

To allow login and usage of a new instance, you must authorize network
access to the default security group.




                                                                                 28
Instances typically have two IPs associated with them.
Private IPs are intended for internal communications between instances
and are usually only routable within a cloud.
Public IPs are used for external access and are usually routable outside of
cloud.
With elastic IPs the user gains control over a set of static IP addresses. Once
allocated to the user, those same IPs can be dynamically associated to
running instances, overriding pre-assigned public IPs.




                                                                               29
On-premise and Hybrid Cloud Infrastructure as a Service.

It uses existing infrastructure to create a scalable, secure web services layer
that abstracts compute, network and storage to offer IaaS.

Eucalyptus web services are uniquely designed for hybrid clouds using the
industry standard Amazon Web Services™ (AWS) API.

Research project in the Computer Science Department at the University of
California, Santa Barbara.

Elastic Utility Computing Architecture Linking Your Programs To Useful
Systems.


                                                                               32
Amazon AWS Interface Compatibility
High-Availability IaaS Service
                                          Quota Management and Accounting
Flexible Clustering
                                          User Group and Role-Based Access
Network Management, Security
                                          Management
Groups, Traffic Isolation
                                          Self-service User Portal*
Elasticity and Self-Service Capability
                                          VMware Hypervisor Support*
Bucket-Based Storage Abstraction (S3-
                                          Virtual-to-Virtual Image Conversion for
Compatible)
                                          VMware*
Block-Based Storage Abstraction (EBS-
                                          Robust SAN Integration*
Compatible)
Xen and KVM Hypervisor Support
Microsoft Windows Guest Support

                                                                             33
34
Node Controller (NC)

Cluster Controller (CC)

Walrus Storage Controller (WS3)

Storage Controller (SC)

Cloud Controller (CLC)

VMware Broker



                                   35
Component that runs on every nodes.

Virtual Machines lifecycle management.

Maintains local ache of instance images.

Manage the virtual network end point.

Queries and control the system software.




                                            36
Gather information about set of Node Controllers.

Schedule a virtual machine execution on a specific Node controller.

Manage the virtual machine network.




                                                                       37
Persistent storage for both virtual machine images and users data using
REST and SOAP.

In walrus data is stored as objects and organized in buckets.

Interface compatible with Amazone Simple Storage Service (S3).




                                                                           38
Provides persistent block storage that can be dynamically attached to the
virtual machine.

The SC is capable of interfacing with various storage systems
(NFS, iSCSI, SAN devices, etc.)

Allow creation of snapshots of volumes.




                                                                             39
Front end of the entire cloud infrastructure.

Entry point into the cloud for administrators, developers, project managers
and end users.

Monitoring resources: Queries other components for information about
resources.

Resource abstraction: Decide which cluster will be used for provisioning the
instances.

Monitoring the running instances.


                                                                            40
41
Cloud Controller   Node Controller
                                     42
kvm-ok
INFO: /dev/kvm does not exist
HINT: sudo modprobe kvm_intel
INFO: Your CPU supports KVM extensions
KVM acceleration can be used




                                         43
Assigns a random MAC address to the VM instance before booting and
attaches the VM instance's Ethernet device to the physical Ethernet through
the node's local Xen bridge.
VM instances typically obtain an IP address using DHCP.




Administrator configures Eucalyptus with a 'map' of MAC address/IP
Address pairs



                                                                          44
Maintain a DHCP server with static mappings for each VM instance that is
created.

Allows Eucalyptus expose a capability similar to Amazon's 'security groups.

Elastic IP is supported in this mode only.




                                                                               45
1.  Download the Eucalyptus release key from
    http://www.eucalyptus.com/eucalyptus-cloud/security/keys.
2. Add the public key to the list of trusted keys.
    apt-key add c1240596-eucalyptus-release-key.pub
3. Create a file in /etc/apt/sources.list.d called eucalyptus.list with the
    following content:
    deb http://downloads.eucalyptus.com/software/eucalyptus/3.1/ubuntu
    precise main
4. On all machines that will run either Eucalyptus or Euca2ools, create a file
    in /etc/apt/sources.list.d called euca2ools.list with the following content:
    deb http://downloads.eucalyptus.com/software/euca2ools/2.1/ubuntu
    precise main
Now install packages
apt-get install eucalyptus-cloud eucalyptus-cc eucalyptus-sc eucalyptus-
    walrus
                                                                             46
1.  Download the Eucalyptus release key from
    http://www.eucalyptus.com/eucalyptus-cloud/security/keys.
2. Add the public key to the list of trusted keys.
    apt-key add c1240596-eucalyptus-release-key.pub
3. Create a file in /etc/apt/sources.list.d called eucalyptus.list with the
    following content:
    deb http://downloads.eucalyptus.com/software/eucalyptus/3.1/ubuntu
    precise main
4. On all machines that will run either Eucalyptus or Euca2ools, create a file
    in /etc/apt/sources.list.d called euca2ools.list with the following content:
    deb http://downloads.eucalyptus.com/software/euca2ools/2.1/ubuntu
    precise main
Now install packages
apt-get install eucalyptus-nc
                                                                             47
48
49
50
51
Open source IaaS cloud computing project started by Rackspace Cloud and
NASA in 2010.

Currently OpenStack is a global collaboration of more than hundred
companies including Dell, AMD, Intel, hp, SUSE, redhat etc.

Currently has packages for CentOS, Fedora, RHEL, Debian, and Ubuntu.

Hypervisors supported by open stack are Xen, KVM, VMware V-Sphere and
Hyper-V.




                                                                        53
OpenStack compute - Nova
OpenStack object storage - Swift
OpenStack image service - Glance
Identity Service - Keystone
UI service - Horizon




                                    54
A package stack of applications from Canonical.

UEC includes a number of open source tools to manage the infrastructure,
including open source cloud software Eucalyptus.

KVM support.

Interface compatibility with EC2.

Simple installation and deployment.

Basic administrative tools for system management and user accounting.


                                                                            55
56
Lets you run web applications on Google's infrastructure.

App Engine applications are easy to build, easy to maintain, and easy to
scale as your traffic and data storage needs grow.

With App Engine, there are no servers to maintain.

You can serve your app from your own domain name.

You can serve your app using a free name on the appspot.com domain.




                                                                            59
Java runtime environment.

Python runtime environments.

Go runtime environment.




                                60
62
63
64
65
66
67
Jithin Parakka
parakkajithin@gmail.com

Contenu connexe

Tendances

NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloudAshok Kumar
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualizationhktripathy
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGTanmoy Barman
 
Cloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computingCloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computinghrmalik20
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Azure kubernetes service (aks)
Azure kubernetes service (aks)Azure kubernetes service (aks)
Azure kubernetes service (aks)Akash Agrawal
 
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...Majid Hajibaba
 
Cloud computing 8 cloud service models
Cloud computing 8 cloud service modelsCloud computing 8 cloud service models
Cloud computing 8 cloud service modelsVaibhav Khanna
 
Layers and types of cloud
Layers and types of cloudLayers and types of cloud
Layers and types of cloudANUSUYA T K
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 

Tendances (20)

Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Cloud Mashup
Cloud MashupCloud Mashup
Cloud Mashup
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud computing and Cloudsim
Cloud computing and CloudsimCloud computing and Cloudsim
Cloud computing and Cloudsim
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
 
Cloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computingCloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
cloud computing
cloud computingcloud computing
cloud computing
 
Azure kubernetes service (aks)
Azure kubernetes service (aks)Azure kubernetes service (aks)
Azure kubernetes service (aks)
 
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Cloud computing 8 cloud service models
Cloud computing 8 cloud service modelsCloud computing 8 cloud service models
Cloud computing 8 cloud service models
 
Layers and types of cloud
Layers and types of cloudLayers and types of cloud
Layers and types of cloud
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Cloud security
Cloud security Cloud security
Cloud security
 

En vedette

Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Managing the Cloud with Open Source Tools
Managing the Cloud with Open Source ToolsManaging the Cloud with Open Source Tools
Managing the Cloud with Open Source ToolsNakul Ezhuthupally
 
comparative study of Cloud computing tools
comparative study of Cloud computing tools comparative study of Cloud computing tools
comparative study of Cloud computing tools Aditya Trivedi
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareBitglass
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responsesshafzonly
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingPriyodarshini Dhar
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingSiva Arunachalam
 
Fujitsu Cloud Computing Professional Services
Fujitsu Cloud Computing Professional ServicesFujitsu Cloud Computing Professional Services
Fujitsu Cloud Computing Professional ServicesWilliam Ho (何添福)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingAlice Barr
 
Open stack 雲端運算軟體介紹
Open stack 雲端運算軟體介紹Open stack 雲端運算軟體介紹
Open stack 雲端運算軟體介紹建宏 陳
 
OpenLayers 3 - Einführung, Verwendungsbeispiele und technische Highlights
OpenLayers 3 - Einführung, Verwendungsbeispiele und technische HighlightsOpenLayers 3 - Einführung, Verwendungsbeispiele und technische Highlights
OpenLayers 3 - Einführung, Verwendungsbeispiele und technische Highlightsselectoid
 
BIWUG 20/02/2006 Backup & Restore with SharePoint 2003
BIWUG 20/02/2006 Backup & Restore with SharePoint 2003BIWUG 20/02/2006 Backup & Restore with SharePoint 2003
BIWUG 20/02/2006 Backup & Restore with SharePoint 2003BIWUG
 
Einstieg in das Windows Installer XML (WiX) ToolSet
Einstieg in das Windows Installer XML (WiX) ToolSetEinstieg in das Windows Installer XML (WiX) ToolSet
Einstieg in das Windows Installer XML (WiX) ToolSetRalf Abramowitsch
 
Metering and Billing for Cloud Services
Metering and Billing for Cloud ServicesMetering and Billing for Cloud Services
Metering and Billing for Cloud ServicesRanjit Nayak
 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networkingsaigandham1
 
Penderaan seksual
Penderaan seksualPenderaan seksual
Penderaan seksualArra Asri
 

En vedette (20)

Cloud based Tools
Cloud based ToolsCloud based Tools
Cloud based Tools
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Managing the Cloud with Open Source Tools
Managing the Cloud with Open Source ToolsManaging the Cloud with Open Source Tools
Managing the Cloud with Open Source Tools
 
comparative study of Cloud computing tools
comparative study of Cloud computing tools comparative study of Cloud computing tools
comparative study of Cloud computing tools
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
Semantic web tools
Semantic web toolsSemantic web tools
Semantic web tools
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Fujitsu Cloud Computing Professional Services
Fujitsu Cloud Computing Professional ServicesFujitsu Cloud Computing Professional Services
Fujitsu Cloud Computing Professional Services
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Open stack 雲端運算軟體介紹
Open stack 雲端運算軟體介紹Open stack 雲端運算軟體介紹
Open stack 雲端運算軟體介紹
 
OpenLayers 3 - Einführung, Verwendungsbeispiele und technische Highlights
OpenLayers 3 - Einführung, Verwendungsbeispiele und technische HighlightsOpenLayers 3 - Einführung, Verwendungsbeispiele und technische Highlights
OpenLayers 3 - Einführung, Verwendungsbeispiele und technische Highlights
 
BIWUG 20/02/2006 Backup & Restore with SharePoint 2003
BIWUG 20/02/2006 Backup & Restore with SharePoint 2003BIWUG 20/02/2006 Backup & Restore with SharePoint 2003
BIWUG 20/02/2006 Backup & Restore with SharePoint 2003
 
Einstieg in das Windows Installer XML (WiX) ToolSet
Einstieg in das Windows Installer XML (WiX) ToolSetEinstieg in das Windows Installer XML (WiX) ToolSet
Einstieg in das Windows Installer XML (WiX) ToolSet
 
Metering and Billing for Cloud Services
Metering and Billing for Cloud ServicesMetering and Billing for Cloud Services
Metering and Billing for Cloud Services
 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networking
 
Penderaan seksual
Penderaan seksualPenderaan seksual
Penderaan seksual
 

Similaire à Cloud Computing Tools

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Openstack Diablo Survey
Openstack Diablo SurveyOpenstack Diablo Survey
Openstack Diablo SurveyPjack Chen
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationAyaz Shahid
 
Mid term report
Mid term reportMid term report
Mid term reportlokesh039
 
virtualization.pptx
virtualization.pptxvirtualization.pptx
virtualization.pptxssuser6e6eec
 
Virtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareVirtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareYeditepe University
 
Automating Your CloudStack Cloud with Puppet
Automating Your CloudStack Cloud with PuppetAutomating Your CloudStack Cloud with Puppet
Automating Your CloudStack Cloud with Puppetbuildacloud
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxVivek Shelke
 
Disco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
Disco: Running Commodity Operating Systems on Scalable Multiprocessors DiscoDisco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
Disco: Running Commodity Operating Systems on Scalable Multiprocessors DiscoMagnus Backman
 
Cloud computing by prabhunath sharma
Cloud computing by prabhunath sharmaCloud computing by prabhunath sharma
Cloud computing by prabhunath sharmaPrabhunath Sharma
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptxssuser0fc2211
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingTom Eberle
 
IaaS - Virtualization_Cambridge.pdf
IaaS - Virtualization_Cambridge.pdfIaaS - Virtualization_Cambridge.pdf
IaaS - Virtualization_Cambridge.pdfDharavathRamesh2
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfkhan593595
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfkhan593595
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulizationAJIT NEGI
 

Similaire à Cloud Computing Tools (20)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Openstack Diablo Survey
Openstack Diablo SurveyOpenstack Diablo Survey
Openstack Diablo Survey
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
Domestic cloud
Domestic cloudDomestic cloud
Domestic cloud
 
Open nebula froscon
Open nebula frosconOpen nebula froscon
Open nebula froscon
 
Mid term report
Mid term reportMid term report
Mid term report
 
virtualization.pptx
virtualization.pptxvirtualization.pptx
virtualization.pptx
 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
 
Virtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareVirtualization technology and an application of building vm ware
Virtualization technology and an application of building vm ware
 
Vitualisation
VitualisationVitualisation
Vitualisation
 
Automating Your CloudStack Cloud with Puppet
Automating Your CloudStack Cloud with PuppetAutomating Your CloudStack Cloud with Puppet
Automating Your CloudStack Cloud with Puppet
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
Disco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
Disco: Running Commodity Operating Systems on Scalable Multiprocessors DiscoDisco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
Disco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
 
Cloud computing by prabhunath sharma
Cloud computing by prabhunath sharmaCloud computing by prabhunath sharma
Cloud computing by prabhunath sharma
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptx
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
IaaS - Virtualization_Cambridge.pdf
IaaS - Virtualization_Cambridge.pdfIaaS - Virtualization_Cambridge.pdf
IaaS - Virtualization_Cambridge.pdf
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdf
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdf
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 

Plus de Jithin Parakka

Towards cashless economy
Towards cashless economyTowards cashless economy
Towards cashless economyJithin Parakka
 
Configuring D-link DSL-2730U Wireless N ADSL2+Router to connect BSNL broaddband
Configuring D-link DSL-2730U Wireless N ADSL2+Router to connect BSNL broaddbandConfiguring D-link DSL-2730U Wireless N ADSL2+Router to connect BSNL broaddband
Configuring D-link DSL-2730U Wireless N ADSL2+Router to connect BSNL broaddbandJithin Parakka
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingJithin Parakka
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud ComputingJithin Parakka
 
Ubnutu Enterprise Cloud (EUC)
Ubnutu Enterprise Cloud (EUC)Ubnutu Enterprise Cloud (EUC)
Ubnutu Enterprise Cloud (EUC)Jithin Parakka
 
self healing optical access network
self healing optical access networkself healing optical access network
self healing optical access networkJithin Parakka
 
Listen and accept function
Listen and accept functionListen and accept function
Listen and accept functionJithin Parakka
 

Plus de Jithin Parakka (8)

Towards cashless economy
Towards cashless economyTowards cashless economy
Towards cashless economy
 
Configuring D-link DSL-2730U Wireless N ADSL2+Router to connect BSNL broaddband
Configuring D-link DSL-2730U Wireless N ADSL2+Router to connect BSNL broaddbandConfiguring D-link DSL-2730U Wireless N ADSL2+Router to connect BSNL broaddband
Configuring D-link DSL-2730U Wireless N ADSL2+Router to connect BSNL broaddband
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Captcha
CaptchaCaptcha
Captcha
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud Computing
 
Ubnutu Enterprise Cloud (EUC)
Ubnutu Enterprise Cloud (EUC)Ubnutu Enterprise Cloud (EUC)
Ubnutu Enterprise Cloud (EUC)
 
self healing optical access network
self healing optical access networkself healing optical access network
self healing optical access network
 
Listen and accept function
Listen and accept functionListen and accept function
Listen and accept function
 

Dernier

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Dernier (20)

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

Cloud Computing Tools

  • 1. Jithin Parakka Department of Computer Science Pondicherry University
  • 2. Cloud Middleware • Amazon EC2 • Eucalyptus • Openstack • Ubuntu Enterprise Cloud • Google App Engine • Approaches to enable multi-tenancy 2
  • 3. 3
  • 4. Middleware is a general term for any program that serves to "glue together" or mediate between two separate and often already existing programs. Cloud Middleware is software used to integrate services, applications and content available on the cloud. 4
  • 5. Data management Identity / security management User interfaces and portals Billing and metering Management and monitoring 5
  • 6. Image Repository User Portal Compute Servers Cloud Controller Block Storage User 6
  • 7. Image Repository User Portal Compute Servers Cloud Controller Block Storage 7
  • 8. User 8
  • 9. Cloud Controller VM VM VM VM Node Node Node Node 9
  • 10. Virtual Virtual Virtual Virtual Machine Machine Machine Machine Management Hypervisor Physical Hardware 10
  • 11. Applications Applications Gust OS Gust OS Virtual Hardware Virtual Hardware Virtual Machine Software Layer Physical Hardware 11
  • 12. Virtual machine talks to VMM which communicates with the hardware platform CPU understands the unmodified instructions generated by Virtualized OS Advantages Complete decoupling of the software from the hardware Complete isolation of different applications Disadvantages VMM should provide additionally virtual bios, virtual memory space and virtual devices 12
  • 13. Applications Applications Applications Gust OS Gust OS Host OS Virtual Hardware Virtual Hardware Virtual Machine Software Layer Physical Hardware 13
  • 14. Guest OS uses specialized API that talks to the VMM which sends the virtualization requests to the hardware. VMM does not need a resource intensive translation of instructions. Advantages Near native performance Migration Disadvantages Not applicable for Windows OS 14
  • 15. Allow multiple operating systems, termed guests, to run concurrently on a host computer. 15
  • 16. A software implementation of a computing environment in which an operating system (OS) or program can be installed and run. Typically emulates a physical computing environment. Requests for CPU, memory, hard disk, network and other hardware resources are managed by a virtualization layer which translates these requests to the underlying physical hardware. Advantages. Multiple OS environments can co-exist on the same computer. Application provisioning, maintenance, high availability and disaster recovery. Disadvantages Security 16
  • 17. Look up and retrieval system for virtual machine images. 19
  • 18. Contain Core Operating System and essential tools. It’s a prototype from which virtual servers are created. Can be obtained from public repository. Or you can create yourself. An image have unique ID and it is used to provision the image. Contain three part Kernel Image. Ramdisk Image. Is an initial root file system that is mounted prior to when the real root file system is available Root File System image. 20
  • 19. Create a virtual disk image ˆ Installing the OS ˆ Installing required applications ˆ Make the OS ready to run on cloud Registering the images with image repository ˆ Testing the image 21
  • 20. 22
  • 21. Provide block level storage that you can mount from your instances. You can format it as your wish.  With multiple block you can create RAID. You can take Snapshot of volume Back up. Replication. 23
  • 22. A GUI for users to access the cloud. User can Launch Instances. Shut down or terminate. List available images. List running instances. Manage security groups. Manage block storage. Manage IP address. Create Key pairs. 24
  • 24. Euca2ools. User can Launch Instances. Shut down or terminate. List available images. List running instances. Manage security groups. Manage block storage. Manage IP address. Create Key pairs. 26
  • 25. Cryptographic Keypairs to verify access to instances. Contain two keys Public key: saved within cloud. Private key: output to the user as character string. Public key is injected to VM when instance starts. When attempting to login to the VMinstance using SSH, the public key is checked against your private key to verify access. 27
  • 26. A security group is a set of networking rules applied to instances. When you first create an instance, it is assigned to a default security group that denies incoming network traffic from all sources. To allow login and usage of a new instance, you must authorize network access to the default security group. 28
  • 27. Instances typically have two IPs associated with them. Private IPs are intended for internal communications between instances and are usually only routable within a cloud. Public IPs are used for external access and are usually routable outside of cloud. With elastic IPs the user gains control over a set of static IP addresses. Once allocated to the user, those same IPs can be dynamically associated to running instances, overriding pre-assigned public IPs. 29
  • 28.
  • 29.
  • 30. On-premise and Hybrid Cloud Infrastructure as a Service. It uses existing infrastructure to create a scalable, secure web services layer that abstracts compute, network and storage to offer IaaS. Eucalyptus web services are uniquely designed for hybrid clouds using the industry standard Amazon Web Services™ (AWS) API. Research project in the Computer Science Department at the University of California, Santa Barbara. Elastic Utility Computing Architecture Linking Your Programs To Useful Systems. 32
  • 31. Amazon AWS Interface Compatibility High-Availability IaaS Service Quota Management and Accounting Flexible Clustering User Group and Role-Based Access Network Management, Security Management Groups, Traffic Isolation Self-service User Portal* Elasticity and Self-Service Capability VMware Hypervisor Support* Bucket-Based Storage Abstraction (S3- Virtual-to-Virtual Image Conversion for Compatible) VMware* Block-Based Storage Abstraction (EBS- Robust SAN Integration* Compatible) Xen and KVM Hypervisor Support Microsoft Windows Guest Support 33
  • 32. 34
  • 33. Node Controller (NC) Cluster Controller (CC) Walrus Storage Controller (WS3) Storage Controller (SC) Cloud Controller (CLC) VMware Broker 35
  • 34. Component that runs on every nodes. Virtual Machines lifecycle management. Maintains local ache of instance images. Manage the virtual network end point. Queries and control the system software. 36
  • 35. Gather information about set of Node Controllers. Schedule a virtual machine execution on a specific Node controller. Manage the virtual machine network. 37
  • 36. Persistent storage for both virtual machine images and users data using REST and SOAP. In walrus data is stored as objects and organized in buckets. Interface compatible with Amazone Simple Storage Service (S3). 38
  • 37. Provides persistent block storage that can be dynamically attached to the virtual machine. The SC is capable of interfacing with various storage systems (NFS, iSCSI, SAN devices, etc.) Allow creation of snapshots of volumes. 39
  • 38. Front end of the entire cloud infrastructure. Entry point into the cloud for administrators, developers, project managers and end users. Monitoring resources: Queries other components for information about resources. Resource abstraction: Decide which cluster will be used for provisioning the instances. Monitoring the running instances. 40
  • 39. 41
  • 40. Cloud Controller Node Controller 42
  • 41. kvm-ok INFO: /dev/kvm does not exist HINT: sudo modprobe kvm_intel INFO: Your CPU supports KVM extensions KVM acceleration can be used 43
  • 42. Assigns a random MAC address to the VM instance before booting and attaches the VM instance's Ethernet device to the physical Ethernet through the node's local Xen bridge. VM instances typically obtain an IP address using DHCP. Administrator configures Eucalyptus with a 'map' of MAC address/IP Address pairs 44
  • 43. Maintain a DHCP server with static mappings for each VM instance that is created. Allows Eucalyptus expose a capability similar to Amazon's 'security groups. Elastic IP is supported in this mode only. 45
  • 44. 1. Download the Eucalyptus release key from http://www.eucalyptus.com/eucalyptus-cloud/security/keys. 2. Add the public key to the list of trusted keys. apt-key add c1240596-eucalyptus-release-key.pub 3. Create a file in /etc/apt/sources.list.d called eucalyptus.list with the following content: deb http://downloads.eucalyptus.com/software/eucalyptus/3.1/ubuntu precise main 4. On all machines that will run either Eucalyptus or Euca2ools, create a file in /etc/apt/sources.list.d called euca2ools.list with the following content: deb http://downloads.eucalyptus.com/software/euca2ools/2.1/ubuntu precise main Now install packages apt-get install eucalyptus-cloud eucalyptus-cc eucalyptus-sc eucalyptus- walrus 46
  • 45. 1. Download the Eucalyptus release key from http://www.eucalyptus.com/eucalyptus-cloud/security/keys. 2. Add the public key to the list of trusted keys. apt-key add c1240596-eucalyptus-release-key.pub 3. Create a file in /etc/apt/sources.list.d called eucalyptus.list with the following content: deb http://downloads.eucalyptus.com/software/eucalyptus/3.1/ubuntu precise main 4. On all machines that will run either Eucalyptus or Euca2ools, create a file in /etc/apt/sources.list.d called euca2ools.list with the following content: deb http://downloads.eucalyptus.com/software/euca2ools/2.1/ubuntu precise main Now install packages apt-get install eucalyptus-nc 47
  • 46. 48
  • 47. 49
  • 48. 50
  • 49. 51
  • 50.
  • 51. Open source IaaS cloud computing project started by Rackspace Cloud and NASA in 2010. Currently OpenStack is a global collaboration of more than hundred companies including Dell, AMD, Intel, hp, SUSE, redhat etc. Currently has packages for CentOS, Fedora, RHEL, Debian, and Ubuntu. Hypervisors supported by open stack are Xen, KVM, VMware V-Sphere and Hyper-V. 53
  • 52. OpenStack compute - Nova OpenStack object storage - Swift OpenStack image service - Glance Identity Service - Keystone UI service - Horizon 54
  • 53. A package stack of applications from Canonical. UEC includes a number of open source tools to manage the infrastructure, including open source cloud software Eucalyptus. KVM support. Interface compatibility with EC2. Simple installation and deployment. Basic administrative tools for system management and user accounting. 55
  • 54. 56
  • 55.
  • 56. Lets you run web applications on Google's infrastructure. App Engine applications are easy to build, easy to maintain, and easy to scale as your traffic and data storage needs grow. With App Engine, there are no servers to maintain. You can serve your app from your own domain name. You can serve your app using a free name on the appspot.com domain. 59
  • 57. Java runtime environment. Python runtime environments. Go runtime environment. 60
  • 58.
  • 59. 62
  • 60. 63
  • 61. 64
  • 62. 65
  • 63. 66
  • 64. 67

Notes de l'éditeur

  1. Tell how all this thing is happening. Fits the user create an account then he will get access to portalThen he will provision the services. He will take an image
  2. Tell how all this thing is happening. Fits the user create an account then he will get access to portalThen he will provision the services. He will take an image
  3. Once the instance has served its purpose and is deleted all state is reclaimed, except thepersistent volume. The ephemeral storage is purged. Memory and vCPU resources arereleased. And of course the image has remained unchanged through out.
  4. Tenants may be given the ability to customize some parts of the application, such as color of the user interface ( UI) or business rules, but they cannot customize the application's code.
  5. he initial RAM disk (initrd) is an initial root file system that is mounted prior to when the real root file system is available. The initrd is bound to the kernel and loaded as part of the kernel boot procedure. The kernel then mounts this initrd as part of the two-stage boot process to load the modules to make the real file systems available and get at the real root file system.The initrd image contains the necessary executables and system files to support the second-stage boot of a Linux system.When you add a root filesystem to Walrus, you bundle the root filesystem file, upload the file to a bucket in Walrus thatyou name, and then register the root filesystem with Eucalyptus. The bundle operation can include a registered ramdisk(ERI ID) and a registered kernel (EKI ID). The resulting image will associate the three images.
  6. Reed eucabook image management in detail E:\\study\\Second_sem\\cloud
  7. here are a few things thathappen on various components of UEC:. Authentication/Authorization of the user request to ensure you havepermission to launch the instance. Identication of CC to take responsibility for deploying the instanceand identication of the NC for running the instance.. Downloading the image from WS3 to NC (images are cached so thatstarting multiple instances of the same machine image downloads thatimage only once)Creating the requested virtual network interface. Starting the instance of the machine image running as a virtual machineusing KVM
  8. Study the exacctdiffernce between stiragecontrollr and walrus
  9. Study the exacctdiffernce between stiragecontrollr and walrus