SlideShare une entreprise Scribd logo
1  sur  48
Cloud Computing An Overview By ChiragDani
Cloud Computing Definitions “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.“ (NIST) “Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like electricity” (Wikipedia) 2 www.chiragdani.com  |  reach2chirag@gmail.com
Conceptual view 3 www.chiragdani.com  |  reach2chirag@gmail.com
Models 4 www.chiragdani.com  |  reach2chirag@gmail.com
SaaS A complete application is offered to the customer, as a service on demand A single instance of the service runs on the cloud & multiple end users are serviced Customers' side: no need for upfront investment in servers or software licenses, Provider's side: the costs are lowered, since only a single application needs to be hosted & maintained. SaaSoffered by Google,Salesforce, Microsoft, Zoho, etc. 5 www.chiragdani.com  |  reach2chirag@gmail.com
PaaS A layer of software, or development environment is encapsulated & offered as a service The customer has the freedom to build his own applications, which run on the provider's infrastructure PaaS providers offer a predefined combination of OS and application servers, such as LAMP platform, restricted J2EE, Ruby etc. PaaS example: Google's App Engine, Microsoft Azure, SalesForce.com 6 www.chiragdani.com  |  reach2chirag@gmail.com
IaaS IaaS provides basic storage and computing capabilities as standardized services over the network. Servers, storage systems, networking equipment, data centre space etc. are pooled and made available to handle workloads. The customer would typically deploy his own software on the infrastructure. IaaS examples: Amazon, GoGrid, 3 Tera, etc. 7 www.chiragdani.com  |  reach2chirag@gmail.com
Cloud computing ontology 8 www.chiragdani.com  |  reach2chirag@gmail.com
Public and Private cloud Enterprises can choose to deploy applications on: Public Cloud Private Cloud  Hybrid cloud 9 www.chiragdani.com  |  reach2chirag@gmail.com
Cloud Computing Benefits Reduced cost Increased storage Flexibility 10 www.chiragdani.com  |  reach2chirag@gmail.com
Cloud Computing Challenges Data Protection Data Recovery and Availability Management Capabilities Regulatory and Compliance Restrictions 11 www.chiragdani.com  |  reach2chirag@gmail.com
Virtualization
What is Virtualization? ,[object Object]
 Virtualization allows you to run multiple operating systems as virtual machines on a single computer.
 Each copy of an operating system is installed into a virtual machine.
 Virtualization is not Simulation or Emulation,[object Object]
Pros and Cons of Virtualization 15 www.chiragdani.com  |  reach2chirag@gmail.com
Types of Virtualization Host Operating System Based Virtualization Bare Metal Hypervisor Paravirtualization 16 www.chiragdani.com  |  reach2chirag@gmail.com
Bare Metal Hypervisor 17 www.chiragdani.com  |  reach2chirag@gmail.com
Host Operating System Based Virtualization 18 www.chiragdani.com  |  reach2chirag@gmail.com
VMware  Architecture 19 www.chiragdani.com  |  reach2chirag@gmail.com
Microsoft  Hyper-V  Architecture 20 www.chiragdani.com  |  reach2chirag@gmail.com
Citrix  XenSrver  Architecture  21 www.chiragdani.com  |  reach2chirag@gmail.com
VMware Architecture
vCentre  Server Components Active Directory Domain Distributed Services Active Directory Interface Database Interface Core  Services User Access Control vSphere API Additional Services vSphere Client ESX/ESXi Management Third Party Applications vCenter Server Database Hosts Hosts Hosts Hosts VMware vCenter Server is a service that acts as a central administration point for ESX/ESXi hosts and their virtual machines, connected on a network. ,[object Object]
 Up to 10,000 powered-on virtual machines per vCenter Server instance23 www.chiragdani.com  |  reach2chirag@gmail.com
VSphere 4  Overview An infrastructure virtualization suite that provides: ,[object Object]
 Management
 Resource optimization
 Application availability
 Operational automation  capabilitiesAggregates physical hardware resources and provides virtual resources to the datacenter 24 www.chiragdani.com  |  reach2chirag@gmail.com
ESX Architecture Vsphere Client vCLI(Scripting) Vcenter Server vSphere API/SDK CIM (Hardware Mgnt) 25 www.chiragdani.com  |  reach2chirag@gmail.com
Virtual Network and Virtual Switch A virtual network provides the networking for hosts and virtual machines that use virtual switches. Service console port ( ESX only) Virtual Machine port group VMKernel port Virtual Switch Uplink Ports 2 kinds of virtual switches: ,[object Object]
 Max  4,088 virtual switch ports per standard switch and 4,096 virtual switch ports per host.
Distributed Virtual switch supports up to 350 hosts26 www.chiragdani.com  |  reach2chirag@gmail.com
Virtual Switch Service console port ( ESX only) Virtual Machine port group VMKernel port Virtual Switch Uplink Ports 3 types of connection types to hosts and virtual machines: ,[object Object]
Connecting VMkernel services to the physical network. Services include access to IP storage, VMware vMotion migrations, and access to mgnt. network for an ESXi host.
Providing networking for the service console, which runs management services for ESX.  27 www.chiragdani.com  |  reach2chirag@gmail.com
Standard Virtual Switch 28 www.chiragdani.com  |  reach2chirag@gmail.com
Storage Overview VMware vStorage VMFS NAS Datastore Types Locally Attached Fiber Channel iSCSI NAS Storage Technology Datastores are logical containers, like file systems, that hide specifics of each storage device and provide a uniform model for storing virtual machine files. Datastores can also be used for storing ISO images, virtual machine templates, and floppy images. 29 www.chiragdani.com  |  reach2chirag@gmail.com
VMFS 30 www.chiragdani.com  |  reach2chirag@gmail.com
Virtual Disk Thin Provisioning 31 www.chiragdani.com  |  reach2chirag@gmail.com
What is Virtual Machine? User Perspective: a  virtual machine is a software platform that, like a physical computer, runs an  operating system and applications. Hypervisor Perspective: a virtual machine is a discrete set of  files,  Main files: Configuration file Virtual disk file NVRAM settings file Log Files 32 www.chiragdani.com  |  reach2chirag@gmail.com
Virtual Machine Files 33 www.chiragdani.com  |  reach2chirag@gmail.com
Virtual Machine Hardware Virtual Machine * Total 60 Devices can be connected 34 www.chiragdani.com  |  reach2chirag@gmail.com
vCenter Converter 35 www.chiragdani.com  |  reach2chirag@gmail.com
Migration Migration — Moving a virtual machine from one host or datastore to another. Types of migrations: Cold— Migrate a virtual machine that is powered off. Suspended — Migrate a virtual machine that is suspended. VMware vMotion— Migrate a virtual machine that is powered on.  Storage vMotion— Migrate a virtual machine’s files, while the virtual  machine is powered on, to a different datastore. Concurrent migrations are possible: A host can be involved in up to two migrations with vMotion or Storage vMotion at one time.  A maximum of eight simultaneous vMotion, cloning, deployment, or Storage vMotion accesses to a single VMFS-3 datastore is supported. 36 www.chiragdani.com  |  reach2chirag@gmail.com
Migration Types Comparison 37 www.chiragdani.com  |  reach2chirag@gmail.com

Contenu connexe

Tendances

Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)Shreyans Jain
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationRahul Hada
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology Ravindra Dastikop
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Majid Hajibaba
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
Cloud computing & energy efficiency using cloud to decrease the energy use in...
Cloud computing & energy efficiency using cloud to decrease the energy use in...Cloud computing & energy efficiency using cloud to decrease the energy use in...
Cloud computing & energy efficiency using cloud to decrease the energy use in...Puru Agrawal
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architectureMohammad Ilyas Malik
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPTSeminar Links
 
Data center Technologies
Data center TechnologiesData center Technologies
Data center TechnologiesEMC
 

Tendances (20)

Cloudsim modified
Cloudsim modifiedCloudsim modified
Cloudsim modified
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Network Virtualization
Network Virtualization Network Virtualization
Network Virtualization
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
 
MetaCDN
MetaCDNMetaCDN
MetaCDN
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
Cloud sim
Cloud simCloud sim
Cloud sim
 
Cloud computing & energy efficiency using cloud to decrease the energy use in...
Cloud computing & energy efficiency using cloud to decrease the energy use in...Cloud computing & energy efficiency using cloud to decrease the energy use in...
Cloud computing & energy efficiency using cloud to decrease the energy use in...
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
Vm migration techniques
Vm migration techniquesVm migration techniques
Vm migration techniques
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Distributed information system
Distributed information systemDistributed information system
Distributed information system
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Data center Technologies
Data center TechnologiesData center Technologies
Data center Technologies
 

Similaire à Cloud Computing and Vertualization

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingmeycham
 
VMworld 2013: vCloud Hybrid Service: Enterprise Applications on vCloud Hybrid...
VMworld 2013: vCloud Hybrid Service: Enterprise Applications on vCloud Hybrid...VMworld 2013: vCloud Hybrid Service: Enterprise Applications on vCloud Hybrid...
VMworld 2013: vCloud Hybrid Service: Enterprise Applications on vCloud Hybrid...VMworld
 
Achieving scalability & speed with IaaS
Achieving scalability & speed with IaaSAchieving scalability & speed with IaaS
Achieving scalability & speed with IaaSIBM Software India
 
Гибридное облако - эффективность в квадрате
Гибридное облако - эффективность в квадратеГибридное облако - эффективность в квадрате
Гибридное облако - эффективность в квадратеActiveCloud
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.pptAjit Mali
 
VMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid CloudVMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid CloudVMworld
 
cloudintroduction.ppt
cloudintroduction.pptcloudintroduction.ppt
cloudintroduction.pptAhmedRebai8
 
Cloud computing
Cloud computing Cloud computing
Cloud computing issam eid
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master classCitrix
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1Sandip Kadam
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptA
 

Similaire à Cloud Computing and Vertualization (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
VMworld 2013: vCloud Hybrid Service: Enterprise Applications on vCloud Hybrid...
VMworld 2013: vCloud Hybrid Service: Enterprise Applications on vCloud Hybrid...VMworld 2013: vCloud Hybrid Service: Enterprise Applications on vCloud Hybrid...
VMworld 2013: vCloud Hybrid Service: Enterprise Applications on vCloud Hybrid...
 
Achieving scalability & speed with IaaS
Achieving scalability & speed with IaaSAchieving scalability & speed with IaaS
Achieving scalability & speed with IaaS
 
Гибридное облако - эффективность в квадрате
Гибридное облако - эффективность в квадратеГибридное облако - эффективность в квадрате
Гибридное облако - эффективность в квадрате
 
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
 
cloud computing
cloud computingcloud computing
cloud computing
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
cloud computng
cloud computng cloud computng
cloud computng
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 
VMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid CloudVMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid Cloud
 
cloudintroduction.ppt
cloudintroduction.pptcloudintroduction.ppt
cloudintroduction.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master class
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud
CloudCloud
Cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cloud Computing and Vertualization

  • 1. Cloud Computing An Overview By ChiragDani
  • 2. Cloud Computing Definitions “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.“ (NIST) “Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like electricity” (Wikipedia) 2 www.chiragdani.com | reach2chirag@gmail.com
  • 3. Conceptual view 3 www.chiragdani.com | reach2chirag@gmail.com
  • 4. Models 4 www.chiragdani.com | reach2chirag@gmail.com
  • 5. SaaS A complete application is offered to the customer, as a service on demand A single instance of the service runs on the cloud & multiple end users are serviced Customers' side: no need for upfront investment in servers or software licenses, Provider's side: the costs are lowered, since only a single application needs to be hosted & maintained. SaaSoffered by Google,Salesforce, Microsoft, Zoho, etc. 5 www.chiragdani.com | reach2chirag@gmail.com
  • 6. PaaS A layer of software, or development environment is encapsulated & offered as a service The customer has the freedom to build his own applications, which run on the provider's infrastructure PaaS providers offer a predefined combination of OS and application servers, such as LAMP platform, restricted J2EE, Ruby etc. PaaS example: Google's App Engine, Microsoft Azure, SalesForce.com 6 www.chiragdani.com | reach2chirag@gmail.com
  • 7. IaaS IaaS provides basic storage and computing capabilities as standardized services over the network. Servers, storage systems, networking equipment, data centre space etc. are pooled and made available to handle workloads. The customer would typically deploy his own software on the infrastructure. IaaS examples: Amazon, GoGrid, 3 Tera, etc. 7 www.chiragdani.com | reach2chirag@gmail.com
  • 8. Cloud computing ontology 8 www.chiragdani.com | reach2chirag@gmail.com
  • 9. Public and Private cloud Enterprises can choose to deploy applications on: Public Cloud Private Cloud Hybrid cloud 9 www.chiragdani.com | reach2chirag@gmail.com
  • 10. Cloud Computing Benefits Reduced cost Increased storage Flexibility 10 www.chiragdani.com | reach2chirag@gmail.com
  • 11. Cloud Computing Challenges Data Protection Data Recovery and Availability Management Capabilities Regulatory and Compliance Restrictions 11 www.chiragdani.com | reach2chirag@gmail.com
  • 13.
  • 14. Virtualization allows you to run multiple operating systems as virtual machines on a single computer.
  • 15. Each copy of an operating system is installed into a virtual machine.
  • 16.
  • 17. Pros and Cons of Virtualization 15 www.chiragdani.com | reach2chirag@gmail.com
  • 18. Types of Virtualization Host Operating System Based Virtualization Bare Metal Hypervisor Paravirtualization 16 www.chiragdani.com | reach2chirag@gmail.com
  • 19. Bare Metal Hypervisor 17 www.chiragdani.com | reach2chirag@gmail.com
  • 20. Host Operating System Based Virtualization 18 www.chiragdani.com | reach2chirag@gmail.com
  • 21. VMware Architecture 19 www.chiragdani.com | reach2chirag@gmail.com
  • 22. Microsoft Hyper-V Architecture 20 www.chiragdani.com | reach2chirag@gmail.com
  • 23. Citrix XenSrver Architecture 21 www.chiragdani.com | reach2chirag@gmail.com
  • 25.
  • 26. Up to 10,000 powered-on virtual machines per vCenter Server instance23 www.chiragdani.com | reach2chirag@gmail.com
  • 27.
  • 31. Operational automation capabilitiesAggregates physical hardware resources and provides virtual resources to the datacenter 24 www.chiragdani.com | reach2chirag@gmail.com
  • 32. ESX Architecture Vsphere Client vCLI(Scripting) Vcenter Server vSphere API/SDK CIM (Hardware Mgnt) 25 www.chiragdani.com | reach2chirag@gmail.com
  • 33.
  • 34. Max 4,088 virtual switch ports per standard switch and 4,096 virtual switch ports per host.
  • 35. Distributed Virtual switch supports up to 350 hosts26 www.chiragdani.com | reach2chirag@gmail.com
  • 36.
  • 37. Connecting VMkernel services to the physical network. Services include access to IP storage, VMware vMotion migrations, and access to mgnt. network for an ESXi host.
  • 38. Providing networking for the service console, which runs management services for ESX. 27 www.chiragdani.com | reach2chirag@gmail.com
  • 39. Standard Virtual Switch 28 www.chiragdani.com | reach2chirag@gmail.com
  • 40. Storage Overview VMware vStorage VMFS NAS Datastore Types Locally Attached Fiber Channel iSCSI NAS Storage Technology Datastores are logical containers, like file systems, that hide specifics of each storage device and provide a uniform model for storing virtual machine files. Datastores can also be used for storing ISO images, virtual machine templates, and floppy images. 29 www.chiragdani.com | reach2chirag@gmail.com
  • 41. VMFS 30 www.chiragdani.com | reach2chirag@gmail.com
  • 42. Virtual Disk Thin Provisioning 31 www.chiragdani.com | reach2chirag@gmail.com
  • 43. What is Virtual Machine? User Perspective: a virtual machine is a software platform that, like a physical computer, runs an operating system and applications. Hypervisor Perspective: a virtual machine is a discrete set of files, Main files: Configuration file Virtual disk file NVRAM settings file Log Files 32 www.chiragdani.com | reach2chirag@gmail.com
  • 44. Virtual Machine Files 33 www.chiragdani.com | reach2chirag@gmail.com
  • 45. Virtual Machine Hardware Virtual Machine * Total 60 Devices can be connected 34 www.chiragdani.com | reach2chirag@gmail.com
  • 46. vCenter Converter 35 www.chiragdani.com | reach2chirag@gmail.com
  • 47. Migration Migration — Moving a virtual machine from one host or datastore to another. Types of migrations: Cold— Migrate a virtual machine that is powered off. Suspended — Migrate a virtual machine that is suspended. VMware vMotion— Migrate a virtual machine that is powered on. Storage vMotion— Migrate a virtual machine’s files, while the virtual machine is powered on, to a different datastore. Concurrent migrations are possible: A host can be involved in up to two migrations with vMotion or Storage vMotion at one time. A maximum of eight simultaneous vMotion, cloning, deployment, or Storage vMotion accesses to a single VMFS-3 datastore is supported. 36 www.chiragdani.com | reach2chirag@gmail.com
  • 48. Migration Types Comparison 37 www.chiragdani.com | reach2chirag@gmail.com
  • 49.
  • 51. Evacuate physical storage soon to be retired
  • 52. Upgrade VMware ESX/ESXi
  • 53. Hosts without virtual machine downtime
  • 54. Source and destination can be different storage types.38 www.chiragdani.com | reach2chirag@gmail.com
  • 55.
  • 56. Up to four concurrent vMotion migrations are supported if you are using a 1Gbps network.
  • 57. Up to eight concurrent vMotion migrations are supported if you are using a 10Gbps network.39 www.chiragdani.com | reach2chirag@gmail.com
  • 58. Distributed Resource Scheduler A DRS cluster is managed by vCenter Server and has following resource management capabilities: Initial placement Load Balancing Power Management DRS Automation Levels: Manual Semi automated Fully Automated 40 www.chiragdani.com | reach2chirag@gmail.com
  • 59. High Availability A highly available system is one that is continuously operational for a desirably long length of time. A fault-tolerant system is designed so that, in the event of an unplanned outage, a backup component can immediately take over with no loss of service. 41 www.chiragdani.com | reach2chirag@gmail.com
  • 60. HA Site Recovery Manager: It is a disaster recovery workflow product that automates setup, failover, and testing of disaster recovery plans. Network availability is accomplished by using the failover feature in network interface card (NIC) teaming VMware vMotionand Storage vMotionkeep virtual machines available during a planned outage Microsoft Clustering Services – An alternative way to provide falut tolerance services to VM Active Directory – you have probably already set it up with multiple redundant servers. vCenter Server Heartbeat provides deep and comprehensive levels of protection against unplanned and, in some cases, planned vCenter Server downtime. ( 15sec.) VMware HA -provides robust general purpose protection against hardware and operating system failures. DRS – Automated resource management. 42 www.chiragdani.com | reach2chirag@gmail.com
  • 61. High Availability Provides automatic restart of virtual machines in case of physical host failures Provides high availability while reducing the need for passive standby hardware and dedicated administrators Provides support for virtual machine failures with virtual machine monitoring and FT Is configured, managed, and monitored through vCenter Server A cluster enabled for VMware HA and DRS can have: Up to 32 hosts per cluster Up to 320 virtual machines per host (regardless of the number of hosts/cluster Upto 3000 VM per cluster 43 www.chiragdani.com | reach2chirag@gmail.com
  • 63. Gartner Magic Quadrant for X86 Virtualization 45 www.chiragdani.com | reach2chirag@gmail.com
  • 64. Choosing VMware or Microsoft? 46 www.chiragdani.com | reach2chirag@gmail.com
  • 65. What should be factored in acquisition cost? 47 www.chiragdani.com | reach2chirag@gmail.com

Notes de l'éditeur

  1. Virtualization is a technology that transforms hardware into software.Virtualization allows you to run multiple operating systems as virtual machines on a single computer.Each copy of an operating system is installed into a virtual machine.Virtualization is not:SimulationEmulation
  2. One of the most important ideas behind cloud computing is scalability, and the key technology that makes that possible is virtualization.Although virtualization technology has been around for many years, it is only now beginning to be fully deployed. One of the reasons for this is the increase in processing power and advances in hardware technology.
  3. You can run one or more applications that are not supported by the Host O/S Better security and isolation, since malfunctions or malware infection of a guest O/S does not affect the others Peace of cake creation of test environments Easy cloning of virtual machines on the same physical hardware or across servers Snapshot technique which enables you to revert back to a specific point in time. Especially useful in case of configuration changes and service pack and patches malfunctions. Excellent recovery scenarios if you backup in VM level. Since VMs are abstracted from hardware you can easily move/restore them to new physicals servers without complications Better utilize hardware resources. VM management software allows you to configure hardware to virtual resource partitioning and utilization. For example you can set specific CPU thresholds, memory allocation, disk space allocation, I/O structures, etc. Also you can let the virtual machine monitor to decide the resources allocation according to utilization. Reduce physical space consumption and reduce hardware costs. You have fewer servers to buy. Benefit from the licensing models many O/S vendors as Microsoft are providing. For example, if you buy Windows 2008 ENT edition you get licenses for 4 virtual machines.
  4. a Hypervisor architecture is the first layer of software installed on a clean x86-based system, sometimes referred to as a “bare metal” approach, as it would be in the case of a computer running VMware ESX server on top of which there maybe one or more virtual machines running.
  5. A Hosted approach provides services on top of a standard operating system, and example of this would be VMware Workstation or VMware server running on a Windows or Linux system on top of which one or more virtual machines are running.
  6. vSpherevSphere is an infrastructure virtualization suite that provides virtualization, management, resource optimization, application availability, and operational automation capabilities in an integrated package.vSphere virtualizes and aggregates the underlying physical hardware resources across multiple systems and provides pools of virtual resources to the datacenter.In addition, vSphere provides a set of distributed services that enable detailed, policy-driven resource allocation, high availability, and scalability of the entire virtual datacenter.vCenter suitVMware vCenter Suite :The central point for configuring, provisioning, and managing virtualized IT environments.
  7. The virtualization stack runs in the parent partition and has direct access to the hardware devices. The root partition then creates the child partitions which host the guest operating systems. 
  8. Core services include management of resources and virtual machines, task scheduling, statistics logging, management of alarms and events, virtual machine provisioning, and host and virtual machine configuration.Distributed services include vMotion, DRS and VMware HA. They are installed with vCenter Server.Additional services are packaged separately from the base product and requires separate installation. No additional license is necessary. Examples include VMware vCenter Update Manager and VMware vCenter Converter.Database interface provides access to the vCenter Server database. ESX/ESXi management. vCenter Server provides access to the ESX/ESXi host through a vCenter Server agent, which is installed on the host when it is added to the vCenter Server inventory. The Active Directory interface provides access to domain user accounts. The VMware vSphere API, in combination with the vSphere SDK, provides an interface for writing custom applications that access vCenter Server functionality.
  9. Extended Sky ElasticESX uses RedHat Linux.The service console uses a 64-bit, 2.6-based Linux kernel compatible with Red Hat Enterprise Linux Server (RHEL) 5.2, CentOS 5.2, and equivalent Linux systems.ESXi = 70MB, does not contain service consol.CIM = Common Information Model.
  10. Virtual switches work at layer 2 of the OSI model. You cannot have two virtual switches mapped to the same physical network interface card ( NIC). But you have two or more physical NICs mapped to the same virtual switch.
  11. Virtual switches work at layer 2 of the OSI model. You cannot have two virtual switches mapped to the same physical network interface card (NIC). you have two or more physical NICs mapped to the same virtual switch.Network Policies:1) Security:Promiscuous modeMAC Address ChangeForged Transmits2) Traffic Shaping: Mechanism of controlling VM network bandwidth 3) NIC (Network Interface Card) Teaming: Load BalancingNetwork Failover DetectionFailbackFailover Order
  12. The slide shows five standard virtual switches, each devoted to a different purpose. From left to right, the switches are:A standard virtual switch with a single outbound adapter. It is being used only by VM1. (Production VM)2. An internal-only standard virtual switch, which allows virtual machines within a single ESX/ ESXi host to communicate directly with other virtual machines connected to the same standard virtual switch. VM2 and VM3 can use this switch communicate with each other. (Network Address Translation)3. A standard virtual switch with teamed NICs. A NIC team provides automatic distribution of packets and failover.4. A standard virtual switch that is used by the VMkemel for accessing iSCSI or NAS-based storage.5. A standard virtual switch that is used by the VMkernel to allow remote management capabilities.
  13. Server virtualization benefits :The first one is certainly at the deployment level. A virtual machine can often be built and customized in less than 20 minutes. Virtual machine mobility. You can move a VM from one host to another at any time. In some cases, you can move it while it is running. This is a great advantage and will help reduce downtime in your network.Virtual machines are just easy to use. Once it is built and configured, you just start the machine and it is immediately ready to deliver services to users.Virtual machines support standard configurations. You can control the way VMs are built: Just create a standard VM and copy the source files for this VM each time you need a new machine. This way, you will always have standard configurations for any VM.Virtual machines also support the concept of volatile services. If a tester or developer needs a virtual machine to perform a given series of tests, you can fire up a new VM, provide it to them in minutes, and then, when they are done with it, you simply delete it. Try doing that with a physical machine!VMs can be certified by the virtualization vendor, ensuring you are using the best of their technology’s capabilities with your VMs.VMs are also secure because they can be completely isolated at any time; just cut off their communications through the host’s virtualization technology.VMs can be scaled out or scaled up. To scale out, simply create more VMs with the same services. To scale up, shut down the VM and assign more resources, such as RAM, processor cores, disks, and NICs to it.VMs are also ideal for disaster recovery, since all you need to do is copy their files to another location, either within your datacenter or to another site entirely.
  14. The diagram shows what happens when you migrate a virtual machine with Storage VMotion:When initiating a migration, vSphere copies all virtual machine files, except the virtual disk files, from the old virtual machine directory to a new directory on the destination datastore.2. Storage vMotion copies the contents of the entire virtual disk file (or files) to the destination datastore, using “changed block tracking” to maintain data integrity during the migrationprocess. Changed block tracking tracks changes to the disk so that Storage vMotion knows which regions of the disk include data.3. Storage vMotion queries the changed block tracking module to determine what regions of the disk were written to during the first iteration. It then performs a second iteration of copy, which copies regions that were changed during the first iteration (several more iterations are possible).4. The virtual machine is quickly suspended and resumed so that it can begin using the virtual machine home directory and disk file or files on the destination datastore.5. Before ESXIESXi allows the virtual machine to start running again, the final changed regions of the source datastore are copied over to the destination and the source home and disks are removed. This approach guarantees complete transactional integrity and is fast enough to be unnoticeable to the end user.
  15. vMotion migration consists of the following steps:The virtual machine’s memory state is copied over the vMotion network from the source host to the target host. Users continue to access the virtual machine and, potentially, update pages in memory. A list of modified pages in memory is kept in a memory bitmap on the source host.2. After most of the virtual machine’s memory is copied from the source host to the target host, the virtual machine is quiesced: no additional activity will occur on the virtual machine. In the quiesce period, vMotion transfers the virtual machine device state and memory bitmap to the destination host.3. Immediately after the virtual machine is quiesced on the source host, the virtual machine is initialized and starts running on the target host. A Reverse Address Resolution Protocol (RARP) request notifies the subnet that virtual machine A’s MAC address is now on a new switch port.4. Users access the virtual machine on the target host instead of the source host. 5. The virtual machine is deleted from the source host.
  16. Distributed Resource Scheduler:VMware DRS - utility that balances computing workloads with available resources in a virtualized environment.VMware will balance load on each physical CPU every 20 milliseconds.
  17. VMware HA provides high availability for applications running in virtual machines. In a server failure, affected virtual machines are automatically restarted on other production servers with spare capacity. VMware HA is configured, managed, and monitored in vCenter Server.
  18. SMP=Symmetric Multiprocessing