SlideShare a Scribd company logo
1 of 82
Prepared by:
Dr. Saba Fatima
Assistant Professor
Department of Electronics and Communication Engineering
SECAB Institute of Engineering and Technology

 Cloud Computing At A Glance
 The Vision Of Cloud Computing
 Defining A Cloud
 A Closer Look
 The Cloud Computing Reference Model
 Characteristics And Benefits
 Challenges Ahead
 Historical Developments
 Distributed Systems
 Virtualization
 Web2.0
 Service-oriented Computing
 Utility-oriented Computing
 Building Cloud Computing Environments
 Application Development
 Infrastructure And System Development
 Computing Platforms And Technologies
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
2
Content

 Cloud computing is a technological advancement that
focuses on the way we design computing systems,
develop applications, and leverage existing services for
building software.
 It is based on the concept of dynamic provisioning, which
is applied not only to services but also to compute
capability, storage, networking, and information
technology (IT) infrastructure in general.
 Resources are made available through the Internet and
offered on a pay-per-use basis from cloud computing
vendors.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
3
Introduction

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
4

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
5
Cloud Computing At A Glance

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
6
Very popular: too many are “In Search” of Cloud Computing

 Such a delivery model is made possible by the effective
composition of several technologies, which have reached
the appropriate maturity level.
 Web 2.0 technologies play a central role in making cloud
computing an attractive opportunity for building
computing systems.
 Service orientation allows cloud computing to deliver its
capabilities with familiar abstractions, while
virtualization confers on cloud computing the necessary
degree of customization, control, and flexibility for
building production and enterprise systems.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
7

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
8
The vision of cloud computing

 optimizing datacenter facilities
 fully utilizing their capabilities to serve multiple
users
 reduce the waste of energy, carbon emissions, thus
contributing to a greener IT on one end and
increasing revenue on the other end.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
9

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
10
Defining a cloud

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
11
Figure: Cloud computing technologies, concepts, and
ideas.

 definition given by Armbrust et al. [28]
“Cloud computing refers to both the applications delivered as
services over the Internet and the hardware and system software
in the datacenters that provide those services”.
 definition proposed by the U.S. National Institute of
Standards and Technology (NIST):
“Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or
service provider interaction”.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
12

 The utility-oriented nature of cloud computing is clearly
expressed by Buyya et al. [30]:
“A cloud is a type of parallel and distributed system consisting of
a collection of interconnected and virtualized computers that are
dynamically provisioned and presented as one or more unified
computing resources based on service-level agreements
established through negotiation between the service provider and
consumers”.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
13

 Cloud computing is helping enterprises,
governments, public and private institutions, and
research organizations shape more effective and
demand-driven computing systems.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
14
A closer look

 Large enterprises can off load some of their activities
to cloud-based systems. Recently, the New York
Times has converted its digital library of pasted it
ions into a Web-friendly format. This required a
considerable amount of computing power for a
short period of time. By renting Amazon EC2 and S3
Cloud resources, the Times performed this task in
36hours and relinquished these resources, with no
additional costs.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
15
Practical example of such systems
exist across all market segments:

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
16
A bird’s-eye view of cloud computing.

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
17
Major deployment models for cloud
computing

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
18
The cloud computing reference model

interesting characteristics that bring benefits to both cloud
service consumers (CSCs) and cloud service providers (CSPs)
• No up-front commitments
• On-demand access
• Nice pricing
• Simplified application acceleration and scalability
• Efficient resource allocation
• Energy efficiency
• Seamless creation and use of third-party services
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
19
Characteristics and benefits

 Besides the practical aspects, which are related to
configuration, networking, and sizing of cloud
computing systems, a new set of challenges
concerning the dynamic provisioning of cloud
computing services and resources arises.
 For example, in the Infrastructure-as-a-Service
domain, how many resources need to be
provisioned, and for how long should they be used,
in order to maximize the benefit?
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
20
Challenges ahead

 management of large computing infrastructures
 the use of virtualization technologies
 issues and challenges concerning the integration of
real and virtual infrastructure
 Security in terms of confidentiality, secrecy, and
protection of data
 challenges for confidential data, which organizations
cannot afford to reveal
 Legal issues may also arise
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
21

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
22
Historical developments
The evolution of distributed computing technologies,1950s-2010s.

 five core technologies that played an important role
in the realization of cloud computing.
-These technologies are distributed systems,
virtualization, Web 2.0, service orientation, and utility
computing.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
23

A distributed system is a collection of independent
computers that appears to its users as a single coherent
system.
 Distributed systems often exhibit other properties
such as heterogeneity, openness, scalability,
transparency, concurrency, continuous availability,
and independent failures.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
24
1. Distributed systems

 Three major milestones have led to cloud computing:
mainframe computing, cluster computing, and grid
computing.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
25

Mainframe
computing
• First examples of
large computational
facilities
• Multiple processing
units
• powerful, highly
reliable computers
• Specialized for data
movement
• Massive I/O
operations
• Example: bulk data
processing such as
online transactions,
enterprise resource
etc.
Cluster Computing
• low-cost
• In 1980s Clusters
beco me the
standard
technology for
parallel and high
performance
computing
• Computational
power of
commodity
machines could be
leveraged to solve
problems
• Universities and
small research labs
Grid Computing
• Early 1990s
• Access large
computational
power ,huge storage
facilities, and a
variety of services.
• Its scale was
nationwide or even
worldwide
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
26

 It encompasses a collection of solutions allowing the
abstraction of some of the fundamental elements for
computing, such as hardware, runtime environments,
storage, and networking.
 Virtualization confers that degree of customization and
control that makes cloud computing appealing for users
and, at the same time, sustainable for cloud services
providers.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
27
2. Virtualization

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
28

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
29

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
30

 allows creation of different computing environments
 replicate runtime environments for programs
Eg: JAVA and .NET are run by a specific program
called a virtual machine.
 isolates execution of application and providing a
finer control on the resource they access
 platform for scaling applications on demand
 Ex: Google App Engine and Windows Azure.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
31

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
32

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
33

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
34

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
35

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
36

 The Web is the primary interface through which cloud
computing delivers its services.
 At present, the Web encompasses a set of technologies and
services that facilitate interactive information sharing,
collaboration, user-centered design, and application
composition. This evolution has transformed the Web into a
rich platform for application development and is known as
Web 2.0.
 These capabilities are obtained by integrating a collection of
standards and technologies such as XML, Asynchronous Java
Script and XML(AJAX), Web Services, and others.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
37
3. Web 2.0 (1999)

 Web 2.0 brings interactivity and flexibility into Web
pages, providing enhanced user experience by gaining
Web based access to all the functions that are normally
found in desktop applications.
 allow us to build applications leveraging the contribution
of users
 New applications can be “synthesized”
 Effective support for dynamism
 Examples: Google Documents, Google Maps, Flickr,
Facebook, Twitter, YouTube, de.li.cious, Blogger, and
Wikipedia.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
38

 Web 2.0 applications are extremely dynamic: they
improve continuously, and new updates and
features are integrated at a constant rate by
following the usage trend of the community.
 There is no need to deploy new software releases on
the installed base at the client side. Users can take
advantage of the new software features simply by
interacting with cloud applications.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
39

 Service orientation is the core reference model for
cloud computing systems. This approach adopts the
concept of services as the main building blocks of
application and system development. Service
oriented computing (SOC) supports the
development of rapid, low-cost, flexible,
interoperable and evolvable applications and
systems
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
40
4. Service-oriented computing

 A service is supposed to be loosely coupled,
reusable, programming language independent, and
location transparent. Loose coupling allows services
to serve different scenarios more easily and makes
them reusable.
 Services are composed and aggregated into a service-
oriented architecture (SOA) [27],which is a logical
way of organizing software systems to provide end
users or other entities distributed over the network
with services through published and discoverable
interfaces.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
41

Identifies a set of functional and non functional
attributes that can be used to evaluate the behavior of
a service from different perspectives
These could be performance metrics such as response time, or
security attributes, transactional integrity, reliability, scalability,
and availability.
QoS requirements are established between the client and the
provider via anSLA
QoS
Quality
of service
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
42
SOC types

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
43
SaaS
Software
as a
Service
The concept of Software-as-a-Service introduces a new delivery model for
applications.
The term has been inherited from the world of application service providers
(ASPs), which deliver software services-based solutions across the wide area
network from a central datacenter and make them available on a subscription
or rental basis.
The ASP is responsible for maintaining the infrastructure and making
available the application, and the client is freed from maintenance costs and
difficult upgrades.

 Utility computing is a vision of computing that
defines a service provisioning model for compute
services in which resources such as storage, compute
power, applications, and infrastructure are packaged
and offered on a pay-per-use basis.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
44
5. Utility-oriented computing

Cloud computing
environments encompasses
Development of applications
and systems that leverage cloud
computing solutions
The creation of frameworks,
platforms, and infrastructures
delivering cloud computing
services.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
45
1.3. Building cloud computing
environments

 Web Application: performance is mostly influenced
by the workload generated by varying user
demands.
 enterprise applications: now leverage the Internet
as the preferred channel for service delivery and user
interaction
 resource-intensive applications :These can be either
data- intensive or compute-intensive applications
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
46
1.3.1 Application development

 For example, scientific applications can require huge
computing capacity to perform large-scale
experiments once in a while, so it is not feasible to
buy the infrastructure supporting them. In this case,
cloud computing can be the solution. Resource-
intensive applications are not interactive and they
are mostly characterized by batch processing.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
47

 Distributed computing, virtualization, service
orientation, and Web 2.0
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
48
1.3.2 Infrastructure and system
development

 Development of a cloud computing application happens
by leveraging platforms and frameworks
 that provide different types of services, from the bare-
metal infrastructure to customizable
 applications serving specific purposes.
 1 Amazon web services (AWS)
 2 Google AppEngine
 3 Microsoft Azure
 4 Hadoop
 5 Force.com and Salesforce.com
 6 Manjrasoft Aneka
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
49
1.3.3 Computing platforms and
technologies

 Amazon web services (AWS)
 offers comprehensive cloud IaaS services
 virtual compute, storage, networking to complete
computing stacks
 Known for its compute and storage-on- demand
services, namely Elastic Compute Cloud (EC2) and
Simple Storage Service(S3).
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
50

Google AppEngine
 Google AppEngine is a scalable runtime environment mostly
devoted to executing Web applications. These take advantage
of the large computing infrastructure of Google to dynamically
scale as the demand varies over time.
 App Engine provides both a secure execution environment and
a collection of services that simplify the development of
scalable and high-performance Web applications. These
services include in-memory caching, scalable data store, job
queues, messaging, and cron tasks.
 Developers can build and test applications on their own
machines using the AppEngine software development kit
(SDK). Once development is complete, developers can easily
migrate their application to AppEngine, set quotas to contain
the costs generated, and make the application available to the
world.
 The languages currently supported are Python, Java, and Go.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
51

 Microsoft Azure is a cloud operating system and a
platform for developing applications in the cloud.
 Applications in Azure are organized around the concept
of roles, which identify a distribution unit for applications
and embody the application’s logic.
 Currently, there are three types of role: Web role, worker
role, and virtual machine role.
 The Web role is designed to host a Web application, the
worker role is a more generic container of applications
and can be used to perform workload processing, and the
virtual machine role provides a virtual environment in
which the computing stack can be fully customized,
including the operating systems.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
52
Microsoft Azure

 Apache Hadoop is an open-source framework that is
suited for processing large data sets on commodity
hardware.
 Hadoop is an implementation of Map Reduce, an
application programming model developed by
Google, which provides two fundamental operations
for data processing: map and reduce.
 The former transforms and synthesizes the input
data provided by the user; the latter aggragates the
output obtained by the map operations.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
53
Hadoop

 Hadoop provides the runtime environment, and
developers need only provide the input data and
specify the map and reduce functions that need to be
executed.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
54

 Force.com is a cloud computing platform for developing
social enterprise applications.
 The platform is the basis for SalesForce.com, a Software-
as-a-Service solution for customer relationship
management.
 Force.com allows developers to create applications by
composing ready-to-use blocks; a complete set of
components supporting all the activities of an enterprise
are available.
 The platform provides complete support for developing
applications, from the design of the data layout to the
definition of business rules and workflows and the
definition of the user interface.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
55
Force.com and
Salesforce.com

 Manjrasoft Aneka is a cloud application platform for
rapid creation of scalable applications and their
deployment on various types of clouds in a seamless
and elastic manner.
 It supports a collection of programming abstractions
for developing applications and a distributed
runtime environment that can be deployed on
heterogeneous hardware (clusters, networked
desktop computers, and cloud resources).
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
56
Manjrasoft Aneka

 Developers can choose different abstractions to
design their application: tasks, distributed threads,
and map-reduce.
 These applications are then executed on the
distributed service-oriented runtime environment,
which can dynamically integrate additional resource
on demand.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
57

 The basis of this technology is the ability of a
computer program— or a combination of software
and hardware—to emulate an executing
environment separate from the one that hosts such
programs.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
58
Virtualization

 three major components: guest, host, and
virtualization layer.
 The guest represents the system component that
interacts with the virtualization layer rather than
with the host, as would normally happen.
 The host represents the original environment where
the guest is supposed to be managed.
 The virtualization layer is responsible for recreating
the same or a different environment where the guest
will operate.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
59
Characteristics of virtualized
environments

The characteristics of virtualized solutions are:
 1 Increased security
 2 Managed execution
 3 Portability
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
60

 The virtual machine represents an emulated environment in
which the guest is executed.
 All the operations of the guest are generally performed against
the virtual machine, which then translates and applies them to
the host.
 This level of indirection allows the virtual machine manager to
control and filter the activity of the guest, thus preventing some
harmful operations from being performed.
 For example, applets downloaded from the Internet run in a
sandboxed 3 version of the Java Virtual Machine (JVM), which
provides them with limited access to the hosting operating
system resources.
 Both the JVM and the .NET runtime provide extensive security
policies for customizing
 the execution environment of applications.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
61
1. Increased security

 Virtualization of the execution environment not only
allows increased security, but a wider range of
features also can be implemented.
 In particular, sharing, aggregation, emulation, and
isolation are the most relevant features
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
62
2 Managed execution.

 Sharing. Virtualization allows the creation of a
separate computing environments within the same
host.
 In this way it is possible to fully exploit the
capabilities of a powerful guest, which would
otherwise be underutilized.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
63

 Aggregation. Not only is it possible to share physical
resource among several guests, but virtualization
also allows aggregation, which is the opposite
process.
 A group of separate hosts can be tied together and
represented to guests as a single virtual host.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
64

 Emulation. Guest programs are executed within an
environment that is controlled by the virtualization
layer, which ultimately is a program.
 This allows for controlling and tuning the
environment that is exposed to guests.
 For instance, a completely different environment
with respect to the host can be emulated, thus
allowing the execution of guest programs requiring
specific characteristics that are not present in the
physical host.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
65

 Isolation. Virtualization allows providing guests—
whether they are operating systems, applications, or
other entities—with a completely separate
environment, in which they are executed.
 The guest program performs its activity by
interacting with an abstraction layer, which provides
access to the underlying resources.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
66

 The concept of portability applies in different ways
according to the specific type of virtualization
considered.
 In the case of a hardware virtualization solution, the
guest is packaged into a virtual image that, in most
cases, can be safely moved and executed on top of
different virtual machines.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
67
3 Portability

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
68

 Execution virtualization includes all techniques that aim
to emulate an execution environment that is separate
from the one hosting the virtualization layer.
 1 Machine reference model
 2 Hardware-level virtualization
a. Hypervisors
b. Hardware virtualization techniques
c. Operating system-level virtualization
 3. Programming language-level virtualization
 4. Application-level virtualization
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
69
3.3.1 Execution
virtualization

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
70

 Privileged instructions are those that are executed
under specific restrictions and are mostly used for
sensitive operations, which expose (behavior-
sensitive) or modify (control-sensitive) the privileged
state.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
71

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
72
2 Hardware-level virtualization

a. Hypervisors
 A fundamental element of hardware virtualization is the hypervisor, or
virtual machine manager
 (VMM).
 It recreates a hardware environment in which guest operating systems are
installed. Thereare two major types of hypervisor: Type I and Type II
 Type I hypervisors run directly on top of the hardware. Therefore, they
take the place of the
 operating systems and interact directly with the ISA interface exposed by
the underlying hardware, and they emulate this interface in order to allow
the management of guest operating systems. This type of hypervisor is also
called a native virtual machine since it runs natively on hardware.
 Type II hypervisors require the support of an operating system to provide
virtualization services.
 This means that they are programs managed by the operating system,
which interact with it through the ABI and emulate the ISA of virtual
hardware for guest operating systems. This type of hypervisor is also
called a hosted virtual machine since it is hosted within an operating
system.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
73

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
74

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
75

 The criteria that need to be met by a virtual machine
manager to efficiently support virtualization were
established by Goldberg and Popek in 1974 [23].
Three properties have to be satisfied:
1. Equivalence. A guest running under the control of a
virtual machine manager should exhibit the same
behavior as when it is executed directly on the physical
host.
2. Resource control. The virtual machine manager
should be in complete control of virtualized resources.
3. Efficiency. A statistically dominant fraction of the
machine instructions should be executed without
intervention from the virtual machine manager.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
76

 Full virtualization.
 Para virtualization.
 Partial virtualization.
..NotesCC_MODULE_1_NOTES.pdf
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
77
b. Hardware virtualization
techniques

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
78
c. Operating system-level
virtualization
 Operating system-level virtualization offers the
opportunity to create different and separated
execution environments for applications that are
managed concurrently.
 Examples of operating system-level virtualizations
are FreeBSD Jails, IBM Logical Partition (LPAR),
SolarisZones and Containers, Parallels Virtuozzo
Containers, OpenVZ, iCore Virtual Accounts, Free
Virtual Private Server (FreeVPS).

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
79
 3 Programming language-level virtualization
 4 Application-level virtualization

Other than execution virtualization, other types of
virtualization provide an abstract environment to
interact with.
These mainly cover storage, networking, and
client/server interaction.
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
80
3.3.2 Other types of
virtualization

4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
81
3.4 Virtualization and
cloud computing

 ..NotesCC_MODULE_1_NOTES.pdf
4/26/2022
Module -1 CCA-18CS643- ECE-SIET,
VIjayapur
82
3.5 Pros and cons of
virtualization

More Related Content

What's hot

Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2Ignacio M. Llorente
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxNayanrai14
 
Cloud Computing Model with Service Oriented Architecture
Cloud Computing Model with Service Oriented ArchitectureCloud Computing Model with Service Oriented Architecture
Cloud Computing Model with Service Oriented ArchitectureYan Zhao
 
Introduction of cloud computing
Introduction of cloud computingIntroduction of cloud computing
Introduction of cloud computingSuman Sharma
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaAmar Myana
 
Cloud computing
Cloud computingCloud computing
Cloud computingkanchu17
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureMonishaNehkal
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloudsagaroceanic11
 
Cloud computing ppt by Binesh
Cloud computing ppt by BineshCloud computing ppt by Binesh
Cloud computing ppt by BineshBinesh
 
Cloud computing
Cloud computingCloud computing
Cloud computingArar Fahem
 
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...Simplilearn
 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper vHameda Hurmat
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingJithin Parakka
 

What's hot (20)

Cloud Computing Basics
Cloud Computing BasicsCloud Computing Basics
Cloud Computing Basics
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptx
 
Cloud Ecosystem
Cloud EcosystemCloud Ecosystem
Cloud Ecosystem
 
Cloud Computing Model with Service Oriented Architecture
Cloud Computing Model with Service Oriented ArchitectureCloud Computing Model with Service Oriented Architecture
Cloud Computing Model with Service Oriented Architecture
 
Introduction of cloud computing
Introduction of cloud computingIntroduction of cloud computing
Introduction of cloud computing
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebula
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 
Cloud computing ppt by Binesh
Cloud computing ppt by BineshCloud computing ppt by Binesh
Cloud computing ppt by Binesh
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper v
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing intro
Cloud computing introCloud computing intro
Cloud computing intro
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 

Similar to Module 1- Introduction-CCA.pptx

IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
 
11th International Conference on Cloud Computing: Services and Architecture (...
11th International Conference on Cloud Computing: Services and Architecture (...11th International Conference on Cloud Computing: Services and Architecture (...
11th International Conference on Cloud Computing: Services and Architecture (...ijccsa
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxDrAdeelAkram2
 
Cloud-based control system: a bibliometric analysis
Cloud-based control system: a bibliometric analysisCloud-based control system: a bibliometric analysis
Cloud-based control system: a bibliometric analysisTELKOMNIKA JOURNAL
 
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisThe Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisIRJET Journal
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)ijujournal
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)ijp2p
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)ijccsa
 
Call for Paper - 3rd International Conference on Machine learning and Cloud C...
Call for Paper - 3rd International Conference on Machine learning and Cloud C...Call for Paper - 3rd International Conference on Machine learning and Cloud C...
Call for Paper - 3rd International Conference on Machine learning and Cloud C...ijmnct
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.IRJET Journal
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computingDivyesh Shah
 
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...SEAA 2022
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Cloud based cyber-physical systems in manufacturing
Cloud based cyber-physical systems in manufacturingCloud based cyber-physical systems in manufacturing
Cloud based cyber-physical systems in manufacturingGiriraj Mannayee
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing reportErManish5
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing reportANKIT KUMAR
 
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...IRJET Journal
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionIRJET Journal
 

Similar to Module 1- Introduction-CCA.pptx (20)

IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
11th International Conference on Cloud Computing: Services and Architecture (...
11th International Conference on Cloud Computing: Services and Architecture (...11th International Conference on Cloud Computing: Services and Architecture (...
11th International Conference on Cloud Computing: Services and Architecture (...
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptx
 
Cloud-based control system: a bibliometric analysis
Cloud-based control system: a bibliometric analysisCloud-based control system: a bibliometric analysis
Cloud-based control system: a bibliometric analysis
 
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisThe Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
 
Call for Paper - 3rd International Conference on Machine learning and Cloud C...
Call for Paper - 3rd International Conference on Machine learning and Cloud C...Call for Paper - 3rd International Conference on Machine learning and Cloud C...
Call for Paper - 3rd International Conference on Machine learning and Cloud C...
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Cloud based cyber-physical systems in manufacturing
Cloud based cyber-physical systems in manufacturingCloud based cyber-physical systems in manufacturing
Cloud based cyber-physical systems in manufacturing
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
 
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Module 1- Introduction-CCA.pptx

  • 1. Prepared by: Dr. Saba Fatima Assistant Professor Department of Electronics and Communication Engineering SECAB Institute of Engineering and Technology
  • 2.   Cloud Computing At A Glance  The Vision Of Cloud Computing  Defining A Cloud  A Closer Look  The Cloud Computing Reference Model  Characteristics And Benefits  Challenges Ahead  Historical Developments  Distributed Systems  Virtualization  Web2.0  Service-oriented Computing  Utility-oriented Computing  Building Cloud Computing Environments  Application Development  Infrastructure And System Development  Computing Platforms And Technologies 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 2 Content
  • 3.   Cloud computing is a technological advancement that focuses on the way we design computing systems, develop applications, and leverage existing services for building software.  It is based on the concept of dynamic provisioning, which is applied not only to services but also to compute capability, storage, networking, and information technology (IT) infrastructure in general.  Resources are made available through the Internet and offered on a pay-per-use basis from cloud computing vendors. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 3 Introduction
  • 4.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 4
  • 5.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 5 Cloud Computing At A Glance
  • 6.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 6 Very popular: too many are “In Search” of Cloud Computing
  • 7.   Such a delivery model is made possible by the effective composition of several technologies, which have reached the appropriate maturity level.  Web 2.0 technologies play a central role in making cloud computing an attractive opportunity for building computing systems.  Service orientation allows cloud computing to deliver its capabilities with familiar abstractions, while virtualization confers on cloud computing the necessary degree of customization, control, and flexibility for building production and enterprise systems. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 7
  • 8.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 8 The vision of cloud computing
  • 9.   optimizing datacenter facilities  fully utilizing their capabilities to serve multiple users  reduce the waste of energy, carbon emissions, thus contributing to a greener IT on one end and increasing revenue on the other end. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 9
  • 10.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 10 Defining a cloud
  • 11.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 11 Figure: Cloud computing technologies, concepts, and ideas.
  • 12.   definition given by Armbrust et al. [28] “Cloud computing refers to both the applications delivered as services over the Internet and the hardware and system software in the datacenters that provide those services”.  definition proposed by the U.S. National Institute of Standards and Technology (NIST): “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 12
  • 13.   The utility-oriented nature of cloud computing is clearly expressed by Buyya et al. [30]: “A cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers”. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 13
  • 14.   Cloud computing is helping enterprises, governments, public and private institutions, and research organizations shape more effective and demand-driven computing systems. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 14 A closer look
  • 15.   Large enterprises can off load some of their activities to cloud-based systems. Recently, the New York Times has converted its digital library of pasted it ions into a Web-friendly format. This required a considerable amount of computing power for a short period of time. By renting Amazon EC2 and S3 Cloud resources, the Times performed this task in 36hours and relinquished these resources, with no additional costs. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 15 Practical example of such systems exist across all market segments:
  • 16.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 16 A bird’s-eye view of cloud computing.
  • 17.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 17 Major deployment models for cloud computing
  • 18.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 18 The cloud computing reference model
  • 19.  interesting characteristics that bring benefits to both cloud service consumers (CSCs) and cloud service providers (CSPs) • No up-front commitments • On-demand access • Nice pricing • Simplified application acceleration and scalability • Efficient resource allocation • Energy efficiency • Seamless creation and use of third-party services 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 19 Characteristics and benefits
  • 20.   Besides the practical aspects, which are related to configuration, networking, and sizing of cloud computing systems, a new set of challenges concerning the dynamic provisioning of cloud computing services and resources arises.  For example, in the Infrastructure-as-a-Service domain, how many resources need to be provisioned, and for how long should they be used, in order to maximize the benefit? 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 20 Challenges ahead
  • 21.   management of large computing infrastructures  the use of virtualization technologies  issues and challenges concerning the integration of real and virtual infrastructure  Security in terms of confidentiality, secrecy, and protection of data  challenges for confidential data, which organizations cannot afford to reveal  Legal issues may also arise 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 21
  • 22.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 22 Historical developments The evolution of distributed computing technologies,1950s-2010s.
  • 23.   five core technologies that played an important role in the realization of cloud computing. -These technologies are distributed systems, virtualization, Web 2.0, service orientation, and utility computing. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 23
  • 24.  A distributed system is a collection of independent computers that appears to its users as a single coherent system.  Distributed systems often exhibit other properties such as heterogeneity, openness, scalability, transparency, concurrency, continuous availability, and independent failures. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 24 1. Distributed systems
  • 25.   Three major milestones have led to cloud computing: mainframe computing, cluster computing, and grid computing. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 25
  • 26.  Mainframe computing • First examples of large computational facilities • Multiple processing units • powerful, highly reliable computers • Specialized for data movement • Massive I/O operations • Example: bulk data processing such as online transactions, enterprise resource etc. Cluster Computing • low-cost • In 1980s Clusters beco me the standard technology for parallel and high performance computing • Computational power of commodity machines could be leveraged to solve problems • Universities and small research labs Grid Computing • Early 1990s • Access large computational power ,huge storage facilities, and a variety of services. • Its scale was nationwide or even worldwide 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 26
  • 27.   It encompasses a collection of solutions allowing the abstraction of some of the fundamental elements for computing, such as hardware, runtime environments, storage, and networking.  Virtualization confers that degree of customization and control that makes cloud computing appealing for users and, at the same time, sustainable for cloud services providers. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 27 2. Virtualization
  • 28.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 28
  • 29.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 29
  • 30.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 30
  • 31.   allows creation of different computing environments  replicate runtime environments for programs Eg: JAVA and .NET are run by a specific program called a virtual machine.  isolates execution of application and providing a finer control on the resource they access  platform for scaling applications on demand  Ex: Google App Engine and Windows Azure. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 31
  • 32.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 32
  • 33.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 33
  • 34.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 34
  • 35.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 35
  • 36.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 36
  • 37.   The Web is the primary interface through which cloud computing delivers its services.  At present, the Web encompasses a set of technologies and services that facilitate interactive information sharing, collaboration, user-centered design, and application composition. This evolution has transformed the Web into a rich platform for application development and is known as Web 2.0.  These capabilities are obtained by integrating a collection of standards and technologies such as XML, Asynchronous Java Script and XML(AJAX), Web Services, and others. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 37 3. Web 2.0 (1999)
  • 38.   Web 2.0 brings interactivity and flexibility into Web pages, providing enhanced user experience by gaining Web based access to all the functions that are normally found in desktop applications.  allow us to build applications leveraging the contribution of users  New applications can be “synthesized”  Effective support for dynamism  Examples: Google Documents, Google Maps, Flickr, Facebook, Twitter, YouTube, de.li.cious, Blogger, and Wikipedia. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 38
  • 39.   Web 2.0 applications are extremely dynamic: they improve continuously, and new updates and features are integrated at a constant rate by following the usage trend of the community.  There is no need to deploy new software releases on the installed base at the client side. Users can take advantage of the new software features simply by interacting with cloud applications. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 39
  • 40.   Service orientation is the core reference model for cloud computing systems. This approach adopts the concept of services as the main building blocks of application and system development. Service oriented computing (SOC) supports the development of rapid, low-cost, flexible, interoperable and evolvable applications and systems 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 40 4. Service-oriented computing
  • 41.   A service is supposed to be loosely coupled, reusable, programming language independent, and location transparent. Loose coupling allows services to serve different scenarios more easily and makes them reusable.  Services are composed and aggregated into a service- oriented architecture (SOA) [27],which is a logical way of organizing software systems to provide end users or other entities distributed over the network with services through published and discoverable interfaces. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 41
  • 42.  Identifies a set of functional and non functional attributes that can be used to evaluate the behavior of a service from different perspectives These could be performance metrics such as response time, or security attributes, transactional integrity, reliability, scalability, and availability. QoS requirements are established between the client and the provider via anSLA QoS Quality of service 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 42 SOC types
  • 43.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 43 SaaS Software as a Service The concept of Software-as-a-Service introduces a new delivery model for applications. The term has been inherited from the world of application service providers (ASPs), which deliver software services-based solutions across the wide area network from a central datacenter and make them available on a subscription or rental basis. The ASP is responsible for maintaining the infrastructure and making available the application, and the client is freed from maintenance costs and difficult upgrades.
  • 44.   Utility computing is a vision of computing that defines a service provisioning model for compute services in which resources such as storage, compute power, applications, and infrastructure are packaged and offered on a pay-per-use basis. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 44 5. Utility-oriented computing
  • 45.  Cloud computing environments encompasses Development of applications and systems that leverage cloud computing solutions The creation of frameworks, platforms, and infrastructures delivering cloud computing services. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 45 1.3. Building cloud computing environments
  • 46.   Web Application: performance is mostly influenced by the workload generated by varying user demands.  enterprise applications: now leverage the Internet as the preferred channel for service delivery and user interaction  resource-intensive applications :These can be either data- intensive or compute-intensive applications 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 46 1.3.1 Application development
  • 47.   For example, scientific applications can require huge computing capacity to perform large-scale experiments once in a while, so it is not feasible to buy the infrastructure supporting them. In this case, cloud computing can be the solution. Resource- intensive applications are not interactive and they are mostly characterized by batch processing. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 47
  • 48.   Distributed computing, virtualization, service orientation, and Web 2.0 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 48 1.3.2 Infrastructure and system development
  • 49.   Development of a cloud computing application happens by leveraging platforms and frameworks  that provide different types of services, from the bare- metal infrastructure to customizable  applications serving specific purposes.  1 Amazon web services (AWS)  2 Google AppEngine  3 Microsoft Azure  4 Hadoop  5 Force.com and Salesforce.com  6 Manjrasoft Aneka 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 49 1.3.3 Computing platforms and technologies
  • 50.   Amazon web services (AWS)  offers comprehensive cloud IaaS services  virtual compute, storage, networking to complete computing stacks  Known for its compute and storage-on- demand services, namely Elastic Compute Cloud (EC2) and Simple Storage Service(S3). 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 50
  • 51.  Google AppEngine  Google AppEngine is a scalable runtime environment mostly devoted to executing Web applications. These take advantage of the large computing infrastructure of Google to dynamically scale as the demand varies over time.  App Engine provides both a secure execution environment and a collection of services that simplify the development of scalable and high-performance Web applications. These services include in-memory caching, scalable data store, job queues, messaging, and cron tasks.  Developers can build and test applications on their own machines using the AppEngine software development kit (SDK). Once development is complete, developers can easily migrate their application to AppEngine, set quotas to contain the costs generated, and make the application available to the world.  The languages currently supported are Python, Java, and Go. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 51
  • 52.   Microsoft Azure is a cloud operating system and a platform for developing applications in the cloud.  Applications in Azure are organized around the concept of roles, which identify a distribution unit for applications and embody the application’s logic.  Currently, there are three types of role: Web role, worker role, and virtual machine role.  The Web role is designed to host a Web application, the worker role is a more generic container of applications and can be used to perform workload processing, and the virtual machine role provides a virtual environment in which the computing stack can be fully customized, including the operating systems. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 52 Microsoft Azure
  • 53.   Apache Hadoop is an open-source framework that is suited for processing large data sets on commodity hardware.  Hadoop is an implementation of Map Reduce, an application programming model developed by Google, which provides two fundamental operations for data processing: map and reduce.  The former transforms and synthesizes the input data provided by the user; the latter aggragates the output obtained by the map operations. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 53 Hadoop
  • 54.   Hadoop provides the runtime environment, and developers need only provide the input data and specify the map and reduce functions that need to be executed. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 54
  • 55.   Force.com is a cloud computing platform for developing social enterprise applications.  The platform is the basis for SalesForce.com, a Software- as-a-Service solution for customer relationship management.  Force.com allows developers to create applications by composing ready-to-use blocks; a complete set of components supporting all the activities of an enterprise are available.  The platform provides complete support for developing applications, from the design of the data layout to the definition of business rules and workflows and the definition of the user interface. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 55 Force.com and Salesforce.com
  • 56.   Manjrasoft Aneka is a cloud application platform for rapid creation of scalable applications and their deployment on various types of clouds in a seamless and elastic manner.  It supports a collection of programming abstractions for developing applications and a distributed runtime environment that can be deployed on heterogeneous hardware (clusters, networked desktop computers, and cloud resources). 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 56 Manjrasoft Aneka
  • 57.   Developers can choose different abstractions to design their application: tasks, distributed threads, and map-reduce.  These applications are then executed on the distributed service-oriented runtime environment, which can dynamically integrate additional resource on demand. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 57
  • 58.   The basis of this technology is the ability of a computer program— or a combination of software and hardware—to emulate an executing environment separate from the one that hosts such programs. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 58 Virtualization
  • 59.   three major components: guest, host, and virtualization layer.  The guest represents the system component that interacts with the virtualization layer rather than with the host, as would normally happen.  The host represents the original environment where the guest is supposed to be managed.  The virtualization layer is responsible for recreating the same or a different environment where the guest will operate. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 59 Characteristics of virtualized environments
  • 60.  The characteristics of virtualized solutions are:  1 Increased security  2 Managed execution  3 Portability 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 60
  • 61.   The virtual machine represents an emulated environment in which the guest is executed.  All the operations of the guest are generally performed against the virtual machine, which then translates and applies them to the host.  This level of indirection allows the virtual machine manager to control and filter the activity of the guest, thus preventing some harmful operations from being performed.  For example, applets downloaded from the Internet run in a sandboxed 3 version of the Java Virtual Machine (JVM), which provides them with limited access to the hosting operating system resources.  Both the JVM and the .NET runtime provide extensive security policies for customizing  the execution environment of applications. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 61 1. Increased security
  • 62.   Virtualization of the execution environment not only allows increased security, but a wider range of features also can be implemented.  In particular, sharing, aggregation, emulation, and isolation are the most relevant features 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 62 2 Managed execution.
  • 63.   Sharing. Virtualization allows the creation of a separate computing environments within the same host.  In this way it is possible to fully exploit the capabilities of a powerful guest, which would otherwise be underutilized. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 63
  • 64.   Aggregation. Not only is it possible to share physical resource among several guests, but virtualization also allows aggregation, which is the opposite process.  A group of separate hosts can be tied together and represented to guests as a single virtual host. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 64
  • 65.   Emulation. Guest programs are executed within an environment that is controlled by the virtualization layer, which ultimately is a program.  This allows for controlling and tuning the environment that is exposed to guests.  For instance, a completely different environment with respect to the host can be emulated, thus allowing the execution of guest programs requiring specific characteristics that are not present in the physical host. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 65
  • 66.   Isolation. Virtualization allows providing guests— whether they are operating systems, applications, or other entities—with a completely separate environment, in which they are executed.  The guest program performs its activity by interacting with an abstraction layer, which provides access to the underlying resources. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 66
  • 67.   The concept of portability applies in different ways according to the specific type of virtualization considered.  In the case of a hardware virtualization solution, the guest is packaged into a virtual image that, in most cases, can be safely moved and executed on top of different virtual machines. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 67 3 Portability
  • 68.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 68
  • 69.   Execution virtualization includes all techniques that aim to emulate an execution environment that is separate from the one hosting the virtualization layer.  1 Machine reference model  2 Hardware-level virtualization a. Hypervisors b. Hardware virtualization techniques c. Operating system-level virtualization  3. Programming language-level virtualization  4. Application-level virtualization 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 69 3.3.1 Execution virtualization
  • 70.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 70
  • 71.   Privileged instructions are those that are executed under specific restrictions and are mostly used for sensitive operations, which expose (behavior- sensitive) or modify (control-sensitive) the privileged state. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 71
  • 72.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 72 2 Hardware-level virtualization
  • 73.  a. Hypervisors  A fundamental element of hardware virtualization is the hypervisor, or virtual machine manager  (VMM).  It recreates a hardware environment in which guest operating systems are installed. Thereare two major types of hypervisor: Type I and Type II  Type I hypervisors run directly on top of the hardware. Therefore, they take the place of the  operating systems and interact directly with the ISA interface exposed by the underlying hardware, and they emulate this interface in order to allow the management of guest operating systems. This type of hypervisor is also called a native virtual machine since it runs natively on hardware.  Type II hypervisors require the support of an operating system to provide virtualization services.  This means that they are programs managed by the operating system, which interact with it through the ABI and emulate the ISA of virtual hardware for guest operating systems. This type of hypervisor is also called a hosted virtual machine since it is hosted within an operating system. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 73
  • 74.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 74
  • 75.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 75
  • 76.   The criteria that need to be met by a virtual machine manager to efficiently support virtualization were established by Goldberg and Popek in 1974 [23]. Three properties have to be satisfied: 1. Equivalence. A guest running under the control of a virtual machine manager should exhibit the same behavior as when it is executed directly on the physical host. 2. Resource control. The virtual machine manager should be in complete control of virtualized resources. 3. Efficiency. A statistically dominant fraction of the machine instructions should be executed without intervention from the virtual machine manager. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 76
  • 77.   Full virtualization.  Para virtualization.  Partial virtualization. ..NotesCC_MODULE_1_NOTES.pdf 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 77 b. Hardware virtualization techniques
  • 78.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 78 c. Operating system-level virtualization  Operating system-level virtualization offers the opportunity to create different and separated execution environments for applications that are managed concurrently.  Examples of operating system-level virtualizations are FreeBSD Jails, IBM Logical Partition (LPAR), SolarisZones and Containers, Parallels Virtuozzo Containers, OpenVZ, iCore Virtual Accounts, Free Virtual Private Server (FreeVPS).
  • 79.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 79  3 Programming language-level virtualization  4 Application-level virtualization
  • 80.  Other than execution virtualization, other types of virtualization provide an abstract environment to interact with. These mainly cover storage, networking, and client/server interaction. 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 80 3.3.2 Other types of virtualization
  • 81.  4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 81 3.4 Virtualization and cloud computing
  • 82.   ..NotesCC_MODULE_1_NOTES.pdf 4/26/2022 Module -1 CCA-18CS643- ECE-SIET, VIjayapur 82 3.5 Pros and cons of virtualization

Editor's Notes

  1. XML – exteneded mark up language. Mark up language is a set of codes, or tags, that describes the text in a digital document . Example HTML used to format web pages