• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Introduction to Windows Azure IaaS
 

Introduction to Windows Azure IaaS

on

  • 429 views

Windows Azure now offers a new feature currently in customer preview called Virtual Machines & Virtual Networks. ...

Windows Azure now offers a new feature currently in customer preview called Virtual Machines & Virtual Networks.

This new functionality provides Windows Azure with an IaaS platform for you to deploy your own virtual machines.
In Windows Azure IaaS you can easily deploy and run Windows Server and Linux virtual machines in Windows Azure.

This session explains the Virtual Machine storage architecture and demonstrates how to provision and customize virtual machine in Windows Azure and how to securely connect them to on-premises IT infrastructure with Windows Azure VPN’s.

Statistics

Views

Total Views
429
Views on SlideShare
370
Embed Views
59

Actions

Likes
0
Downloads
1
Comments
0

6 Embeds 59

http://feschenkoalex.blogspot.com 29
http://feschenkoalex.blogspot.ru 20
http://local.nesa.intern 5
http://feschenkoalex.blogspot.de 3
http://feschenkoalex.blogspot.co.uk 1
http://feeds.feedburner.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Welcome and speaker’s introductionSet expectations that the session is going to be about identity and access control for applications targeting the Windows Azure platform, as opposed to the services themselves (SQL Azure, Windows Azure management calls, etc.)
  • Most of the things I mentioned apply to SOAP web services as well. The WIF wizard works in the same way, ACS can handle the appropriate protocols, and so on. There are some obvious differences, both in expressive power (services can give higher guarantees thanks to the use of more advanced cryptography) and requirements (redirects are not necessary, but the requirements on the client capabilities are more stringent).It is noteworthy that at the moment Silverlight does not have the full capabilities you’d find in WCF based clients on desktop and backend applications, however most of the scenarios can be addressed in the same way with some custom code (see the Silverlight exercises in the identity developer training kit).The REST scenario is not supported out of the box for WIF. The REST protocols are so simple that you can handle those yourself,. However if you want to leverage the handily claims model and config-based authentication mechanisms there are custom extensions to WIF you can leverage.There are various mobile (and not only) scenarios in which you want to call a service, but the identity you want to authenticate is available only via redirect (i.e. browser based) protocols. There’s still work to be done there, but for early thinking about how to tackle the scenario you can refer to the windows phone 7 sample on acs.codeplex.com
  • Most of the things I mentioned apply to SOAP web services as well. The WIF wizard works in the same way, ACS can handle the appropriate protocols, and so on. There are some obvious differences, both in expressive power (services can give higher guarantees thanks to the use of more advanced cryptography) and requirements (redirects are not necessary, but the requirements on the client capabilities are more stringent).It is noteworthy that at the moment Silverlight does not have the full capabilities you’d find in WCF based clients on desktop and backend applications, however most of the scenarios can be addressed in the same way with some custom code (see the Silverlight exercises in the identity developer training kit).The REST scenario is not supported out of the box for WIF. The REST protocols are so simple that you can handle those yourself,. However if you want to leverage the handily claims model and config-based authentication mechanisms there are custom extensions to WIF you can leverage.There are various mobile (and not only) scenarios in which you want to call a service, but the identity you want to authenticate is available only via redirect (i.e. browser based) protocols. There’s still work to be done there, but for early thinking about how to tackle the scenario you can refer to the windows phone 7 sample on acs.codeplex.com
  • Most of the things I mentioned apply to SOAP web services as well. The WIF wizard works in the same way, ACS can handle the appropriate protocols, and so on. There are some obvious differences, both in expressive power (services can give higher guarantees thanks to the use of more advanced cryptography) and requirements (redirects are not necessary, but the requirements on the client capabilities are more stringent).It is noteworthy that at the moment Silverlight does not have the full capabilities you’d find in WCF based clients on desktop and backend applications, however most of the scenarios can be addressed in the same way with some custom code (see the Silverlight exercises in the identity developer training kit).The REST scenario is not supported out of the box for WIF. The REST protocols are so simple that you can handle those yourself,. However if you want to leverage the handily claims model and config-based authentication mechanisms there are custom extensions to WIF you can leverage.There are various mobile (and not only) scenarios in which you want to call a service, but the identity you want to authenticate is available only via redirect (i.e. browser based) protocols. There’s still work to be done there, but for early thinking about how to tackle the scenario you can refer to the windows phone 7 sample on acs.codeplex.com
  • Most of the things I mentioned apply to SOAP web services as well. The WIF wizard works in the same way, ACS can handle the appropriate protocols, and so on. There are some obvious differences, both in expressive power (services can give higher guarantees thanks to the use of more advanced cryptography) and requirements (redirects are not necessary, but the requirements on the client capabilities are more stringent).It is noteworthy that at the moment Silverlight does not have the full capabilities you’d find in WCF based clients on desktop and backend applications, however most of the scenarios can be addressed in the same way with some custom code (see the Silverlight exercises in the identity developer training kit).The REST scenario is not supported out of the box for WIF. The REST protocols are so simple that you can handle those yourself,. However if you want to leverage the handily claims model and config-based authentication mechanisms there are custom extensions to WIF you can leverage.There are various mobile (and not only) scenarios in which you want to call a service, but the identity you want to authenticate is available only via redirect (i.e. browser based) protocols. There’s still work to be done there, but for early thinking about how to tackle the scenario you can refer to the windows phone 7 sample on acs.codeplex.com
  • Most of the things I mentioned apply to SOAP web services as well. The WIF wizard works in the same way, ACS can handle the appropriate protocols, and so on. There are some obvious differences, both in expressive power (services can give higher guarantees thanks to the use of more advanced cryptography) and requirements (redirects are not necessary, but the requirements on the client capabilities are more stringent).It is noteworthy that at the moment Silverlight does not have the full capabilities you’d find in WCF based clients on desktop and backend applications, however most of the scenarios can be addressed in the same way with some custom code (see the Silverlight exercises in the identity developer training kit).The REST scenario is not supported out of the box for WIF. The REST protocols are so simple that you can handle those yourself,. However if you want to leverage the handily claims model and config-based authentication mechanisms there are custom extensions to WIF you can leverage.There are various mobile (and not only) scenarios in which you want to call a service, but the identity you want to authenticate is available only via redirect (i.e. browser based) protocols. There’s still work to be done there, but for early thinking about how to tackle the scenario you can refer to the windows phone 7 sample on acs.codeplex.com
  • Let’s think for a moment about claims based identity in itself and at the tools we can use to implement it; we will re-introduce cloud-specific considerations later
  • Let’s think for a moment about claims based identity in itself and at the tools we can use to implement it; we will re-introduce cloud-specific considerations later
  • Let’s think for a moment about claims based identity in itself and at the tools we can use to implement it; we will re-introduce cloud-specific considerations later
  • Let’s think for a moment about claims based identity in itself and at the tools we can use to implement it; we will re-introduce cloud-specific considerations later
  • Let’s think for a moment about claims based identity in itself and at the tools we can use to implement it; we will re-introduce cloud-specific considerations later

Introduction to Windows Azure IaaS Introduction to Windows Azure IaaS Presentation Transcript

  • VM Role (PaaS) Virtual Machine (IaaS) Хранилище Непостоянное Постоянное, легко расширяемое VHD создается удаленно и загружается VHD можно создать как удаленно так и на Развертывание в хранилище портале Internal точки доступа открыты по умолчанию, контролируются файрволлом на операционных Сетевое Internal/Input точки доступа системах. взаимодействие настраиваются в конфигурации Input точки доступа контролируются через портал, конфигурацию или сторонними скриптами. Развертывание приложений, Приложения, которым необходимо постоянноеОсновной сценарий требующих длительной или ручной хранилище для успешного функционирования в применения установки условиях Windows Azure
  • Значение по Тип диска Поддерживается умолчанию Диск с ReadOnly and ReadWriteоперационной ReadWrite системой None, ReadOnly andДиск с данными None ReadWrite
  • # DataVM Size CPU Cores Memory Bandwidth DisksExtra Small Shared 768 MB 5 (Mbps) 1Small 1 1.75 GB 100 (Mbps) 2Medium 2 3.5 GB 200 (Mbps) 4Large 4 7 GB 400 (Mbps) 8Extra Large 8 14 GB 800 (Mbps) 16
  • Образы и диски хранятся в Windows Azure Blob StorageДанные реплицируются в 3-х местахВсе существующие клиенты работают Windows Azure Storage
  • No SLA SLA 99.95%
  • ContosoVNet (10.0.0.0/8) Cloud Service1 FrontEndSubnet (10.0.0.0/16) 80 Load IIS Virtual MachinesBalancer Direct Access via VNET Cloud Service 2 SQLSubnet (10.1.0.0/16) SQL Mirror
  • 10.1.2.0/24 10.1.3.0/2410.2.2.0/24 10.2.3.0/24
  • Виртуальная сеть Windows Azure Отзывы и поддержка vnetfeedback@microsoft.com http://social.msdn.microsoft.com/Forums/en- US/WAVirtualMachinesVirtualNetworkWindows Azure поддерживает