SlideShare a Scribd company logo
1 of 42
Download to read offline
COMPUTER PORT
IT SOLUTIONS
VIRTUALIZATION & CLOUD COMPUTING
PRIMER
WWW.COMPUTERPORT.IN
1
Index
 Introduction
 Prerequisites
 Evolution of Computing
 Evolution of Computing Models
 Evolution of Internet
 What is Cloud Computing
 What is Virtualization
 Cloud Players Around the World
 What's in the cloud
 Future of Computing
 Thank You
 Contact Information
2
The course has some prerequisites:
 The participant should have some basic skill sets
like loading an OS, booting a system from CD,
Network Configuration, Thumb Drive etc.,
 Users should be conversant with Protocols like
TCP,CIFS, NFS etc.,
 All the modules mentioned above can be learnt
independently but the Virtualization of processing
power should be learnt first.
 A basic understanding of Networks, Internet
Connectivity etc is essential.
3
4
5What is MAINFRAME Technology?
A mainframe computer is a very large computer capable of
handling and processing very large amounts of data quickly.
They are used by large institutions, such as government
agencies and large corporations.
6
What is Enterprise client-server?
Enterprise computing is the name given to distributed
computing as practiced in medium-sized or large organizations
where the need to share data between physically-distributed
sites is the primary motivator for the creation of a distributed
system.
In some ways, mainframes are more powerful than
supercomputers because they support more
simultaneous programs.
7
What is Cloud Technology?
Cloud is a broad term and cannot be easily expanded in one
single line. Cloud can be IaaS, PaaS, AaaS and again there
are many internal small things that have to be understood to
have a clear grip on the massively disruptive technology.
8THE EVOLUTION OF IT COMPUTING MODELS
SCALING
HARDWARE
SLA
HA TYPE
SOFTWARE
CONSUMPTION
99.999 99.9 Always On
Vertical Horizontal
Custom Enterprise Community
SoftwareHardware
DistributedDecentralizedCentralized
Self service
Shared
service
Centralized
service
MainFrame Enterprise Cloud
9
10
08-May-15BYCOMPUTERPORTITSOLUTIONS
11
ISP 1.0
PROVIDED ACCESS
TO INTERNET (Dial-up,
ISDN,T1,T3)
ISP 2.0
ACCESS TO SERVERS
AT THE INTERNET
ACCESS POINT
Colo (ISP 3.0 )
RACKS OF YOUR
EUIPMENT AT THE
INTERNET ACCESS
POINT
ASP (ISP 4.0 )
HOSTED (TRADITIONALLY
DESIGNED)
APPLICATIONS AT THE
INTERNET ACCESS POINT
SaaS
INTERNET BASED
APPICATIONS AND
SERVICES
CLOUD (ISO 5.0)
DYNAMIC, INTERNET
OPTIMIZED INFRASTRUCTURE
FOR HOSTING YOUR
APPLICATIONS
EVOLUTION OF CLOUD COMPUTING
The figure below
illustrates how ISP turned
into Cloud Computing.
12Components of Cloud Computing :
1. Virtualization of Processing Power
2. Virtualization of Storage
(aka SDS - Software Defined Storage)
3. Virtualization of Networking
(aka SDN - Software Defined Networking)
4. Identity Access Management (IAM)
5. Imaging Service
13What is Virtualization ?
In computing, virtualization refers to the act of creating
a virtual (rather than actual) version of something, including
(but not limited to) a virtual computer
hardware platform, operating system (OS), storage device,
or computer network resources.
Traditional
data center
Well-known,
stable, and secure
Utilization <15%
Virtualized
data center
Utilization increases
to >50%
Management costs
decrease
On-premises
dynamic data
center—private
cloud
Management costs
decrease significantly
IT as a Service
Chargeback
Off-premises
dynamic data
center—public
cloud
14The Evolution of VirtualizationThe Evolution of Virtualization
151.Virtualization of Processing Power
VirtualizationofProcessingPower
16
VirtualizationofProcessingPower
17
Type 1 Virtualization products:
VMware : ESXi Server
Microsoft : Hyper - V
Citrix : XenServer
Linux (Any Distribution) : KVM - Kernel Virtual Machine
VirtualizationofProcessingPower
18
Type 2 Virtualization Products:
VMware : Workstation
Oracle : Virtual Box
VirtualizationofProcessingPower
19
2. Virtualization of Storage (aka SDS - Software Defined Storage)
SoftwareDefinedStorage
20
SoftwareDefinedStorage
21
SoftwareDefinedStorage
22
SoftwareDefinedStorage
233. Virtualization of Networking (aka SDN - Software Defined
Networking)
Software-defined networking (SDN) is an approach to
computer networking that allows network administrators to
manage network services through abstraction of lower-level
functionality. This is done by decoupling the system that
makes decisions about where traffic is sent (the control
plane) from the underlying systems that forward traffic to the
selected destination (the data plane). The inventors and
vendors of these systems claim that this simplifies
networking.[1]
SDN requires some method for the control plane to
communicate with the data plane.
SoftwareDefinedNetworking
24
Control Plane: A major function of the control plane is deciding
which routes go into the main routing table
Data Plane: In routing, the forwarding plane, sometimes called
the data plane, defines the part of the router architecture that
decides what to do with packets arriving on an inbound
interface.
SoftwareDefinedNetworking
25
SoftwareDefinedNetworking
26The Three Key Elements of SDN:
Ability to manage the forwarding of frames/packets and
apply policy;
Ability to perform this at scale in a dynamic fashion;
Ability to be programmed.
SoftwareDefinedNetworking
27
VEB : Virtual Ethernet Bridge
SoftwareDefinedNetworking
284. Identity Access Management:
Identity management (IdM) is the task of controlling
information about users on computers. Such information
includes information that authenticates the identity of a user,
and information that describes information and actions they
are authorized to access and/or perform. It also includes the
management of descriptive information about the user and
how and by whom that information can be accessed and
modified. Managed entities typically include users, hardware
and network resources and even applications.
In computing, identity management (IdM) describes the
management of individual principals, their authentication,
authorization, and privileges within or across system and
enterprise boundaries with the goal of increasing security and
productivity while decreasing cost, downtime and repetitive
tasks.
IdentityAccessManagement
29
IdentityAccessManagement
30
IdentityAccessManagement
31Imaging Service:
Imaging Service is a generic term and is being used almost
everyday by the Administrators even general users also.
Whenever we are using a bootable CD, we are using an
Imaging Service. ISO image is a classic example of Imaging
Service.
Every Commercial or non commercial entities are providing
proprietary formats as far as Imaging Service is concerned:
A multi-format image registry, the image service allows uploads
of private and public images in a variety of formats, including:
1.Raw
2.Machine (kernel/ramdisk outside of image, a.k.a. AMI)
3.VHD (Hyper-V)
4.VDI (VirtualBox)
5.qcow2 (Qemu/KVM)
6.VMDK (VMWare)
7.OVF (VMWare, others)
ImagingService
32
ImagingService
33
CloudComputing
34
After Using Virtualization you can give the following
•Software as a Service (SaaS)
•Platform as a Service (PaaS)
•Infrastructure as a Service (IaaS)
•IT as a Service
•Storage-as-a-service
•Database-as-a-service (DaaS)
•Information-as-a-service
•Process-as-a-service
•Application-as-a-service (AaaS)
•Integration-as-a-service
•Security-as-a-service
•Management/governance-as-a-service(MaaS)
•Testing-as-a-service
•Green IT
CloudComputing
35Comparison between
Cloud Computing and Traditional Hosting.
CloudComputing
36Present Cloud Awareness Statics :
25%
75%
Awareness on Cloud Computing
Aware Not Aware
CloudComputing
37
What’s in the Cloud ?
CloudComputing
38CLOUD MANAGEMENT PLATFORMS:
The above mentioned modules are individual but can be
assembled to have a seamless functionality.
This is what has been done by the following Cloud
Management Platforms (CMP):
VMware VCloud
Microsoft Azure
OpenStack
CloudStack
OpenNebula
HP Helion Eucalyptus
CloudComputing
39Future Of Cloud Computing
CloudComputing
Thank You
 Contact us :
TSS Ravi Kumar
ravikumar@computerport.in
www.computerport.in
Rajendar Chintala
rajendar@computerport.in
Ileshwar T
ilesh@computerport.in
40
CloudComputing
Disclaimer
We have tried our level best not to infringe on any copy right
material. In case you find any copy righted material in this
presentation, please let us know.
41
CloudComputing
Source Sites
 openstack.org
 Vmware.com
 azure.microsoft.com
 opennebula.org
 linux-kvm.org
 proxmox.com
 en.Wikipedia.org (for Cloud Computing Info)
 aws.amazon.com
42
CloudComputing

More Related Content

What's hot

vmware-linxdatacenter-13q3-en-case-study
vmware-linxdatacenter-13q3-en-case-studyvmware-linxdatacenter-13q3-en-case-study
vmware-linxdatacenter-13q3-en-case-study
Arno Coster CM
 

What's hot (20)

Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...
 
Cloud Computing and Data Centers
Cloud Computing and Data CentersCloud Computing and Data Centers
Cloud Computing and Data Centers
 
IBM MQ on cloud and containers
IBM MQ on cloud and containersIBM MQ on cloud and containers
IBM MQ on cloud and containers
 
Module 3-cloud computing
Module 3-cloud computingModule 3-cloud computing
Module 3-cloud computing
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
M08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryptionM08 protecting your message data in IBM MQ with encryption
M08 protecting your message data in IBM MQ with encryption
 
Bienvenida
BienvenidaBienvenida
Bienvenida
 
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conferenceIBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Using ibm mq in managed file transfer environments final
Using ibm mq in managed file transfer environments finalUsing ibm mq in managed file transfer environments final
Using ibm mq in managed file transfer environments final
 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing
 
Tech 2 Tech: Network performance
Tech 2 Tech: Network performanceTech 2 Tech: Network performance
Tech 2 Tech: Network performance
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud Orchestrator - IBM Software Defined Environment Event
Cloud Orchestrator - IBM Software Defined Environment EventCloud Orchestrator - IBM Software Defined Environment Event
Cloud Orchestrator - IBM Software Defined Environment Event
 
Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
 
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
 
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
Lessons Learned during IBM SmartCloud Orchestrator Deployment at a Large Tel...
 
vmware-linxdatacenter-13q3-en-case-study
vmware-linxdatacenter-13q3-en-case-studyvmware-linxdatacenter-13q3-en-case-study
vmware-linxdatacenter-13q3-en-case-study
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
Introductorytocomputing
 

Viewers also liked

Past simple indefinite tense
Past simple indefinite tensePast simple indefinite tense
Past simple indefinite tense
Kolevatovat
 
Microsoft Powerpoint
Microsoft PowerpointMicrosoft Powerpoint
Microsoft Powerpoint
Mi L
 

Viewers also liked (20)

Chap1 expan slots
Chap1 expan slotsChap1 expan slots
Chap1 expan slots
 
Expansion Slot
Expansion SlotExpansion Slot
Expansion Slot
 
External Cards and Slots
External Cards and SlotsExternal Cards and Slots
External Cards and Slots
 
Past simple indefinite tense
Past simple indefinite tensePast simple indefinite tense
Past simple indefinite tense
 
Ports of Mother Board
Ports of Mother BoardPorts of Mother Board
Ports of Mother Board
 
Diagram of cpu ports
Diagram of cpu portsDiagram of cpu ports
Diagram of cpu ports
 
Physical Layer Port
Physical Layer PortPhysical Layer Port
Physical Layer Port
 
Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
Automated Hacking Tools - Meet the New Rock Stars in the Cyber UndergroundAutomated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
 
Hacking
HackingHacking
Hacking
 
Firewall
FirewallFirewall
Firewall
 
Expansion slots
Expansion slotsExpansion slots
Expansion slots
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Libre Office Impress Lesson 2: Creating a Slide Show
Libre Office Impress Lesson 2: Creating a Slide ShowLibre Office Impress Lesson 2: Creating a Slide Show
Libre Office Impress Lesson 2: Creating a Slide Show
 
Libre Office Impress Lesson 1
Libre Office Impress Lesson 1Libre Office Impress Lesson 1
Libre Office Impress Lesson 1
 
Expansion cards
Expansion cardsExpansion cards
Expansion cards
 
Ethical hacking with Python tools
Ethical hacking with Python toolsEthical hacking with Python tools
Ethical hacking with Python tools
 
Microsoft Powerpoint
Microsoft PowerpointMicrosoft Powerpoint
Microsoft Powerpoint
 
Computer Ports
Computer PortsComputer Ports
Computer Ports
 
iSCSI (Internet Small Computer System Interface)
iSCSI (Internet Small Computer System Interface)iSCSI (Internet Small Computer System Interface)
iSCSI (Internet Small Computer System Interface)
 
Computer ports
Computer portsComputer ports
Computer ports
 

Similar to Computer Port IT Solutions JNTU Lecture

Similar to Computer Port IT Solutions JNTU Lecture (20)

CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
 
CLOUD
CLOUDCLOUD
CLOUD
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 
Cloud
CloudCloud
Cloud
 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Computer Port IT Solutions JNTU Lecture

  • 1. COMPUTER PORT IT SOLUTIONS VIRTUALIZATION & CLOUD COMPUTING PRIMER WWW.COMPUTERPORT.IN 1
  • 2. Index  Introduction  Prerequisites  Evolution of Computing  Evolution of Computing Models  Evolution of Internet  What is Cloud Computing  What is Virtualization  Cloud Players Around the World  What's in the cloud  Future of Computing  Thank You  Contact Information 2
  • 3. The course has some prerequisites:  The participant should have some basic skill sets like loading an OS, booting a system from CD, Network Configuration, Thumb Drive etc.,  Users should be conversant with Protocols like TCP,CIFS, NFS etc.,  All the modules mentioned above can be learnt independently but the Virtualization of processing power should be learnt first.  A basic understanding of Networks, Internet Connectivity etc is essential. 3
  • 4. 4
  • 5. 5What is MAINFRAME Technology? A mainframe computer is a very large computer capable of handling and processing very large amounts of data quickly. They are used by large institutions, such as government agencies and large corporations.
  • 6. 6 What is Enterprise client-server? Enterprise computing is the name given to distributed computing as practiced in medium-sized or large organizations where the need to share data between physically-distributed sites is the primary motivator for the creation of a distributed system. In some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs.
  • 7. 7 What is Cloud Technology? Cloud is a broad term and cannot be easily expanded in one single line. Cloud can be IaaS, PaaS, AaaS and again there are many internal small things that have to be understood to have a clear grip on the massively disruptive technology.
  • 8. 8THE EVOLUTION OF IT COMPUTING MODELS SCALING HARDWARE SLA HA TYPE SOFTWARE CONSUMPTION 99.999 99.9 Always On Vertical Horizontal Custom Enterprise Community SoftwareHardware DistributedDecentralizedCentralized Self service Shared service Centralized service MainFrame Enterprise Cloud
  • 9. 9
  • 10. 10
  • 11. 08-May-15BYCOMPUTERPORTITSOLUTIONS 11 ISP 1.0 PROVIDED ACCESS TO INTERNET (Dial-up, ISDN,T1,T3) ISP 2.0 ACCESS TO SERVERS AT THE INTERNET ACCESS POINT Colo (ISP 3.0 ) RACKS OF YOUR EUIPMENT AT THE INTERNET ACCESS POINT ASP (ISP 4.0 ) HOSTED (TRADITIONALLY DESIGNED) APPLICATIONS AT THE INTERNET ACCESS POINT SaaS INTERNET BASED APPICATIONS AND SERVICES CLOUD (ISO 5.0) DYNAMIC, INTERNET OPTIMIZED INFRASTRUCTURE FOR HOSTING YOUR APPLICATIONS EVOLUTION OF CLOUD COMPUTING The figure below illustrates how ISP turned into Cloud Computing.
  • 12. 12Components of Cloud Computing : 1. Virtualization of Processing Power 2. Virtualization of Storage (aka SDS - Software Defined Storage) 3. Virtualization of Networking (aka SDN - Software Defined Networking) 4. Identity Access Management (IAM) 5. Imaging Service
  • 13. 13What is Virtualization ? In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including (but not limited to) a virtual computer hardware platform, operating system (OS), storage device, or computer network resources.
  • 14. Traditional data center Well-known, stable, and secure Utilization <15% Virtualized data center Utilization increases to >50% Management costs decrease On-premises dynamic data center—private cloud Management costs decrease significantly IT as a Service Chargeback Off-premises dynamic data center—public cloud 14The Evolution of VirtualizationThe Evolution of Virtualization
  • 15. 151.Virtualization of Processing Power VirtualizationofProcessingPower
  • 17. 17 Type 1 Virtualization products: VMware : ESXi Server Microsoft : Hyper - V Citrix : XenServer Linux (Any Distribution) : KVM - Kernel Virtual Machine VirtualizationofProcessingPower
  • 18. 18 Type 2 Virtualization Products: VMware : Workstation Oracle : Virtual Box VirtualizationofProcessingPower
  • 19. 19 2. Virtualization of Storage (aka SDS - Software Defined Storage) SoftwareDefinedStorage
  • 23. 233. Virtualization of Networking (aka SDN - Software Defined Networking) Software-defined networking (SDN) is an approach to computer networking that allows network administrators to manage network services through abstraction of lower-level functionality. This is done by decoupling the system that makes decisions about where traffic is sent (the control plane) from the underlying systems that forward traffic to the selected destination (the data plane). The inventors and vendors of these systems claim that this simplifies networking.[1] SDN requires some method for the control plane to communicate with the data plane. SoftwareDefinedNetworking
  • 24. 24 Control Plane: A major function of the control plane is deciding which routes go into the main routing table Data Plane: In routing, the forwarding plane, sometimes called the data plane, defines the part of the router architecture that decides what to do with packets arriving on an inbound interface. SoftwareDefinedNetworking
  • 26. 26The Three Key Elements of SDN: Ability to manage the forwarding of frames/packets and apply policy; Ability to perform this at scale in a dynamic fashion; Ability to be programmed. SoftwareDefinedNetworking
  • 27. 27 VEB : Virtual Ethernet Bridge SoftwareDefinedNetworking
  • 28. 284. Identity Access Management: Identity management (IdM) is the task of controlling information about users on computers. Such information includes information that authenticates the identity of a user, and information that describes information and actions they are authorized to access and/or perform. It also includes the management of descriptive information about the user and how and by whom that information can be accessed and modified. Managed entities typically include users, hardware and network resources and even applications. In computing, identity management (IdM) describes the management of individual principals, their authentication, authorization, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks. IdentityAccessManagement
  • 31. 31Imaging Service: Imaging Service is a generic term and is being used almost everyday by the Administrators even general users also. Whenever we are using a bootable CD, we are using an Imaging Service. ISO image is a classic example of Imaging Service. Every Commercial or non commercial entities are providing proprietary formats as far as Imaging Service is concerned: A multi-format image registry, the image service allows uploads of private and public images in a variety of formats, including: 1.Raw 2.Machine (kernel/ramdisk outside of image, a.k.a. AMI) 3.VHD (Hyper-V) 4.VDI (VirtualBox) 5.qcow2 (Qemu/KVM) 6.VMDK (VMWare) 7.OVF (VMWare, others) ImagingService
  • 34. 34 After Using Virtualization you can give the following •Software as a Service (SaaS) •Platform as a Service (PaaS) •Infrastructure as a Service (IaaS) •IT as a Service •Storage-as-a-service •Database-as-a-service (DaaS) •Information-as-a-service •Process-as-a-service •Application-as-a-service (AaaS) •Integration-as-a-service •Security-as-a-service •Management/governance-as-a-service(MaaS) •Testing-as-a-service •Green IT CloudComputing
  • 35. 35Comparison between Cloud Computing and Traditional Hosting. CloudComputing
  • 36. 36Present Cloud Awareness Statics : 25% 75% Awareness on Cloud Computing Aware Not Aware CloudComputing
  • 37. 37 What’s in the Cloud ? CloudComputing
  • 38. 38CLOUD MANAGEMENT PLATFORMS: The above mentioned modules are individual but can be assembled to have a seamless functionality. This is what has been done by the following Cloud Management Platforms (CMP): VMware VCloud Microsoft Azure OpenStack CloudStack OpenNebula HP Helion Eucalyptus CloudComputing
  • 39. 39Future Of Cloud Computing CloudComputing
  • 40. Thank You  Contact us : TSS Ravi Kumar ravikumar@computerport.in www.computerport.in Rajendar Chintala rajendar@computerport.in Ileshwar T ilesh@computerport.in 40 CloudComputing
  • 41. Disclaimer We have tried our level best not to infringe on any copy right material. In case you find any copy righted material in this presentation, please let us know. 41 CloudComputing
  • 42. Source Sites  openstack.org  Vmware.com  azure.microsoft.com  opennebula.org  linux-kvm.org  proxmox.com  en.Wikipedia.org (for Cloud Computing Info)  aws.amazon.com 42 CloudComputing